Loading ...

Play interactive tourEdit tour

Analysis Report Purchase_Order-Documents.exe

Overview

General Information

Sample Name:Purchase_Order-Documents.exe
Analysis ID:358397
MD5:970bce067ae6cdcf4cdf30a0a1f87186
SHA1:75b2a8726790ca34db04a003ba3547a1eb28f3fd
SHA256:f828f3f4109c84bc59b919c268c2d73ed8f1b327b3c3afd64184c2ddf2ae3aa5
Tags:AgentTesla
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Purchase_Order-Documents.exe (PID: 6536 cmdline: 'C:\Users\user\Desktop\Purchase_Order-Documents.exe' MD5: 970BCE067AE6CDCF4CDF30A0A1F87186)
    • schtasks.exe (PID: 6656 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "FTP Info": "kehoach@cuulongcorp.com.vnClkehoach9999@mail.cuulongcorp.com.vnkhanhkythuats@davitecco.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.Purchase_Order-Documents.exe.3f47870.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              6.2.Purchase_Order-Documents.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                1.2.Purchase_Order-Documents.exe.3f47870.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.Purchase_Order-Documents.exe.3e493c0.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    1.2.Purchase_Order-Documents.exe.3ded5a0.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Scheduled temp file as task from temp locationShow sources
                      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\Purchase_Order-Documents.exe' , ParentImage: C:\Users\user\Desktop\Purchase_Order-Documents.exe, ParentProcessId: 6536, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp', ProcessId: 6656

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 1.2.Purchase_Order-Documents.exe.3ded5a0.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "FTP Info": "kehoach@cuulongcorp.com.vnClkehoach9999@mail.cuulongcorp.com.vnkhanhkythuats@davitecco.com"}
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\iplcwcpzEHCt.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: Purchase_Order-Documents.exeJoe Sandbox ML: detected
                      Source: 6.2.Purchase_Order-Documents.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 1.2.Purchase_Order-Documents.exe.7e0000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen3

                      Compliance:

                      barindex
                      Uses 32bit PE filesShow sources
                      Source: Purchase_Order-Documents.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                      Source: Purchase_Order-Documents.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_01240F70
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_01240F68
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 4x nop then jmp 0E88A745h1_2_0E88A60D
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h1_2_0E88C480
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h1_2_0E88C470

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49736 -> 210.245.86.30:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49737 -> 210.245.86.30:587
                      Source: global trafficTCP traffic: 192.168.2.5:49736 -> 210.245.86.30:587
                      Source: Joe Sandbox ViewIP Address: 210.245.86.30 210.245.86.30
                      Source: Joe Sandbox ViewASN Name: FPT-AS-APTheCorporationforFinancingPromotingTechnolo FPT-AS-APTheCorporationforFinancingPromotingTechnolo
                      Source: global trafficTCP traffic: 192.168.2.5:49736 -> 210.245.86.30:587
                      Source: unknownDNS traffic detected: queries for: mail.cuulongcorp.com.vn
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.501834551.00000000034E9000.00000004.00000001.sdmpString found in binary or memory: http://mail.cuulongcorp.com.vn
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.242382284.0000000002C31000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpString found in binary or memory: http://vfhLbj.com
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, Purchase_Order-Documents.exe, 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, Purchase_Order-Documents.exe, 00000006.00000002.501881878.00000000034F8000.00000004.00000001.sdmpString found in binary or memory: https://fMYs0MG0mK9Y4AIBA2r.org
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, Purchase_Order-Documents.exe, 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 6.2.Purchase_Order-Documents.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE7A81F2Du002d21DDu002d4DA7u002dA59Au002dB0367CE7B312u007d/u003503D1904u002d199Cu002d4286u002dA2C4u002d63746339E9A3.csLarge array initialization: .cctor: array initializer size 12031
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Purchase_Order-Documents.exe
                      Source: initial sampleStatic PE information: Filename: Purchase_Order-Documents.exe
                      PE file has nameless sectionsShow sources
                      Source: Purchase_Order-Documents.exeStatic PE information: section name:
                      Source: iplcwcpzEHCt.exe.1.drStatic PE information: section name:
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007ED21B1_2_007ED21B
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_012404781_2_01240478
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_012411911_2_01241191
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0124C0B01_2_0124C0B0
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0124EA901_2_0124EA90
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0E88CC731_2_0E88CC73
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0E8800071_2_0E880007
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0E8800401_2_0E880040
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0E8839021_2_0E883902
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007E38AA1_2_007E38AA
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007EDD0A1_2_007EDD0A
                      Source: Purchase_Order-Documents.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: iplcwcpzEHCt.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Purchase_Order-Documents.exeBinary or memory string: OriginalFilename vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.247747965.000000000A2F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000000.227945843.00000000007E2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameValueCollection.exeF vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.248975157.000000000E740000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.250389729.000000000F000000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.250389729.000000000F000000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePmfeIdaSFDCkBULKXtdgtBb.exe4 vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.249765193.000000000EF10000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.504526509.00000000064B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamePmfeIdaSFDCkBULKXtdgtBb.exe4 vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.497290648.0000000001138000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.496848788.0000000000CD2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameValueCollection.exeF vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exeBinary or memory string: OriginalFilenameValueCollection.exeF vs Purchase_Order-Documents.exe
                      Source: Purchase_Order-Documents.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Purchase_Order-Documents.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: iplcwcpzEHCt.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Purchase_Order-Documents.exeStatic PE information: Section: qYIUK ZLIB complexity 1.00046164773
                      Source: iplcwcpzEHCt.exe.1.drStatic PE information: Section: qYIUK ZLIB complexity 1.00046164773
                      Source: 6.2.Purchase_Order-Documents.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 6.2.Purchase_Order-Documents.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@2/1
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile created: C:\Users\user\AppData\Roaming\iplcwcpzEHCt.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6664:120:WilError_01
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeMutant created: \Sessions\1\BaseNamedObjects\SqETuZmjb
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB2A2.tmpJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile read: C:\Users\user\Desktop\Purchase_Order-Documents.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Purchase_Order-Documents.exe 'C:\Users\user\Desktop\Purchase_Order-Documents.exe'
                      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp'
                      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\Desktop\Purchase_Order-Documents.exe C:\Users\user\Desktop\Purchase_Order-Documents.exe
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess created: C:\Users\user\Desktop\Purchase_Order-Documents.exe C:\Users\user\Desktop\Purchase_Order-Documents.exeJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Purchase_Order-Documents.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Purchase_Order-Documents.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeUnpacked PE file: 1.2.Purchase_Order-Documents.exe.7e0000.0.unpack qYIUK:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                      Binary contains a suspicious time stampShow sources
                      Source: initial sampleStatic PE information: 0xE2E2904A [Tue Aug 15 16:48:10 2090 UTC]
                      Source: Purchase_Order-Documents.exeStatic PE information: section name: qYIUK
                      Source: Purchase_Order-Documents.exeStatic PE information: section name:
                      Source: iplcwcpzEHCt.exe.1.drStatic PE information: section name: qYIUK
                      Source: iplcwcpzEHCt.exe.1.drStatic PE information: section name:
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F42CE push cs; retf 1_2_007F431A
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F42BC push cs; retf 1_2_007F42CC
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F42A4 push cs; retf 1_2_007F42B4
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F3B7E push es; retf 1_2_007F3D8C
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F477E push ss; retf 1_2_007F4788
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F3D7C push es; retf 1_2_007F3D8C
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F4772 push ss; retf 1_2_007F477C
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F4760 push ss; retf 1_2_007F4770
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F475A push ss; retf 1_2_007F475E
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F431C push cs; retf 1_2_007F4320
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F4B14 push ds; retf 1_2_007F4BCC
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F3DE8 push es; retf 1_2_007F3E2E
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F47D2 push ss; retf 1_2_007F47E8
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F4BCE push ds; retf 1_2_007F4BD2
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F3DC4 push es; retf 1_2_007F3DE6
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F4BB6 push ds; retf 1_2_007F4BCC
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F4BB0 push ds; retf 1_2_007F4BB4
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F3DA6 push es; retf 1_2_007F3DC2
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F479C push ss; retf 1_2_007F47D0
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F3D8E push es; retf 1_2_007F3DA4
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_007F478A push ss; retf 1_2_007F479A
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0E885645 push cs; ret 1_2_0E88564C
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_0E8870BB push edi; iretd 1_2_0E8870D6
                      Source: initial sampleStatic PE information: section name: qYIUK entropy: 7.99672559397
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85454569485
                      Source: initial sampleStatic PE information: section name: qYIUK entropy: 7.99672559397
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85454569485
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile created: C:\Users\user\AppData\Roaming\iplcwcpzEHCt.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp'
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM_3Show sources
                      Source: Yara matchFile source: 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase_Order-Documents.exe PID: 6536, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWindow / User API: threadDelayed 3001Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWindow / User API: threadDelayed 6793Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exe TID: 6540Thread sleep time: -104470s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exe TID: 6592Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exe TID: 7088Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exe TID: 7092Thread sleep count: 3001 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exe TID: 7092Thread sleep count: 6793 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exe TID: 7088Thread sleep count: 36 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.249504544.000000000E898000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_&B
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Purchase_Order-Documents.exe, 00000006.00000003.456966772.0000000001454000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Purchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging:

                      barindex
                      Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeCode function: 1_2_01240F70 CheckRemoteDebuggerPresent,1_2_01240F70
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeMemory written: C:\Users\user\Desktop\Purchase_Order-Documents.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeProcess created: C:\Users\user\Desktop\Purchase_Order-Documents.exe C:\Users\user\Desktop\Purchase_Order-Documents.exeJump to behavior
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499106708.0000000001B10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499106708.0000000001B10000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499106708.0000000001B10000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499106708.0000000001B10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: Purchase_Order-Documents.exe, 00000006.00000002.499106708.0000000001B10000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Users\user\Desktop\Purchase_Order-Documents.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Users\user\Desktop\Purchase_Order-Documents.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase_Order-Documents.exe PID: 6732, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase_Order-Documents.exe PID: 6536, type: MEMORY
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3f47870.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.Purchase_Order-Documents.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3f47870.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3e493c0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3ded5a0.3.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\Purchase_Order-Documents.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase_Order-Documents.exe PID: 6732, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase_Order-Documents.exe PID: 6732, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase_Order-Documents.exe PID: 6536, type: MEMORY
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3f47870.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.Purchase_Order-Documents.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3f47870.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3e493c0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Purchase_Order-Documents.exe.3ded5a0.3.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing14NTDSSecurity Software Discovery331Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsVirtualization/Sandbox Evasion15SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion15DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 358397 Sample: Purchase_Order-Documents.exe Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 29 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->29 31 Found malware configuration 2->31 33 Sigma detected: Scheduled temp file as task from temp location 2->33 35 10 other signatures 2->35 7 Purchase_Order-Documents.exe 7 2->7         started        process3 file4 19 C:\Users\user\AppData\...\iplcwcpzEHCt.exe, PE32 7->19 dropped 21 C:\Users\...\iplcwcpzEHCt.exe:Zone.Identifier, ASCII 7->21 dropped 23 C:\Users\user\AppData\Local\...\tmpB2A2.tmp, XML 7->23 dropped 25 C:\Users\...\Purchase_Order-Documents.exe.log, ASCII 7->25 dropped 37 Detected unpacking (changes PE section rights) 7->37 39 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->39 41 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->41 43 2 other signatures 7->43 11 Purchase_Order-Documents.exe 6 7->11         started        15 schtasks.exe 1 7->15         started        signatures5 process6 dnsIp7 27 mail.cuulongcorp.com.vn 210.245.86.30, 49736, 49737, 587 FPT-AS-APTheCorporationforFinancingPromotingTechnolo Viet Nam 11->27 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->45 47 Tries to steal Mail credentials (via file access) 11->47 49 Tries to harvest and steal ftp login credentials 11->49 51 Tries to harvest and steal browser information (history, passwords, etc) 11->51 17 conhost.exe 15->17         started        signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Purchase_Order-Documents.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\iplcwcpzEHCt.exe100%Joe Sandbox ML

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      6.2.Purchase_Order-Documents.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      1.2.Purchase_Order-Documents.exe.7e0000.0.unpack100%AviraTR/Crypt.XPACK.Gen3Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      mail.cuulongcorp.com.vn1%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://vfhLbj.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://fMYs0MG0mK9Y4AIBA2r.org0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://mail.cuulongcorp.com.vn0%Avira URL Cloudsafe
                      https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.cuulongcorp.com.vn
                      210.245.86.30
                      truetrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://vfhLbj.comPurchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://fMYs0MG0mK9Y4AIBA2r.orgPurchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, Purchase_Order-Documents.exe, 00000006.00000002.501881878.00000000034F8000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://DynDns.comDynDNSPurchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPurchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase_Order-Documents.exe, 00000001.00000002.242382284.0000000002C31000.00000004.00000001.sdmpfalse
                        high
                        https://api.telegram.org/bot%telegramapi%/Purchase_Order-Documents.exe, 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, Purchase_Order-Documents.exe, 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmpfalse
                          high
                          https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xPurchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPurchase_Order-Documents.exe, 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, Purchase_Order-Documents.exe, 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssPurchase_Order-Documents.exe, 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmpfalse
                              high
                              http://mail.cuulongcorp.com.vnPurchase_Order-Documents.exe, 00000006.00000002.501834551.00000000034E9000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0Purchase_Order-Documents.exe, 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              210.245.86.30
                              unknownViet Nam
                              18403FPT-AS-APTheCorporationforFinancingPromotingTechnolotrue

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:358397
                              Start date:25.02.2021
                              Start time:15:13:18
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 17s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:Purchase_Order-Documents.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:24
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@6/5@2/1
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 45
                              • Number of non-executed functions: 7
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 40.88.32.150, 104.43.139.144, 184.30.20.56, 51.11.168.160, 52.255.188.83, 104.42.151.234, 52.147.198.201, 51.103.5.186, 51.104.144.132, 92.122.213.194, 92.122.213.247, 8.248.149.254, 67.27.234.126, 67.27.159.126, 67.27.159.254, 67.27.157.126, 20.54.26.129, 52.155.217.156
                              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              15:14:12API Interceptor762x Sleep call for process: Purchase_Order-Documents.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              210.245.86.30urgent_quotation_24_02_2021.exeGet hashmaliciousBrowse
                                DES_ Holdings Ltd - products list.exeGet hashmaliciousBrowse
                                  PO_PRTH21551-#ST0026.exeGet hashmaliciousBrowse
                                    Pidosan Trading - Products List.exeGet hashmaliciousBrowse
                                      Master Group Corporation - Purchase Order.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        mail.cuulongcorp.com.vnurgent_quotation_24_02_2021.exeGet hashmaliciousBrowse
                                        • 210.245.86.30
                                        DES_ Holdings Ltd - products list.exeGet hashmaliciousBrowse
                                        • 210.245.86.30
                                        PO_PRTH21551-#ST0026.exeGet hashmaliciousBrowse
                                        • 210.245.86.30
                                        Pidosan Trading - Products List.exeGet hashmaliciousBrowse
                                        • 210.245.86.30
                                        Master Group Corporation - Purchase Order.exeGet hashmaliciousBrowse
                                        • 210.245.86.30

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        FPT-AS-APTheCorporationforFinancingPromotingTechnolourgent_quotation_24_02_2021.exeGet hashmaliciousBrowse
                                        • 210.245.86.30
                                        quotation.exeGet hashmaliciousBrowse
                                        • 210.245.8.133
                                        DES_ Holdings Ltd - products list.exeGet hashmaliciousBrowse
                                        • 210.245.86.30
                                        UBL e-statement.exeGet hashmaliciousBrowse
                                        • 210.245.90.208
                                        vJHWQgfJ23.exeGet hashmaliciousBrowse
                                        • 118.69.133.4
                                        http://bocnemdanang.com/alfacgiapi/olnMao0HGVTkRYOSSKlIa0ON2G3priKh0GZSfwkFqddkyJ9kyDINr80Aps0e/Get hashmaliciousBrowse
                                        • 103.221.220.216
                                        RFQ 00068643 New Order Shipment to Jebel Ali Port UAE.exeGet hashmaliciousBrowse
                                        • 210.245.8.133
                                        SKM_C3350191107102300.exeGet hashmaliciousBrowse
                                        • 210.245.8.133
                                        TvY5gkbW.exeGet hashmaliciousBrowse
                                        • 183.80.182.27
                                        Payment form-976107909.docGet hashmaliciousBrowse
                                        • 210.245.90.209
                                        INVOICE.htmlGet hashmaliciousBrowse
                                        • 103.221.222.30
                                        idWMSrWvoE.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        cK2ClsvtJE.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        AXZFXiJCj3.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        lHuFdWpoMA.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        0j4pavDJBN.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        0V9GzUGmwu.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        1Tkig2z6A1.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        CDItmDQ5cQ.exeGet hashmaliciousBrowse
                                        • 118.69.11.81
                                        44KBPHzTuK.exeGet hashmaliciousBrowse
                                        • 118.69.11.81

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase_Order-Documents.exe.log
                                        Process:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):1400
                                        Entropy (8bit):5.344635889251176
                                        Encrypted:false
                                        SSDEEP:24:ML9E4Ks2f84jE4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEg:MxHKXfvjHKx1qHiYHKhQnoPtHoxHhAHV
                                        MD5:CDB0CBEDFEC7CCD7229835F37D89305C
                                        SHA1:39023F8CFF044D44485DB049CE242383BCB07035
                                        SHA-256:B1D78A56636298EFB329B368C4D52F2DCCF7F948AF7E7A30D9A8916D532760FE
                                        SHA-512:35066E4F12E28DA041B4EE5BE8E24B21A1FBF6D3267100EFA4EEC701288F48F5BA4E63A4866D1DEC3E1A8147A060B9E0D4C4D4A2FB49890AA617172AE4BFA764
                                        Malicious:true
                                        Reputation:moderate, very likely benign file
                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                        C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp
                                        Process:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1649
                                        Entropy (8bit):5.171485035916021
                                        Encrypted:false
                                        SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBTtn:cbhC7ZlNQF/rydbz9I3YODOLNdq3j
                                        MD5:D75F7083DACCE330AFAC5AD5BBC2DE74
                                        SHA1:EF53F69823E22445F5B8484548B68125E4DA078F
                                        SHA-256:621321D565CA73074F1A2E14D3D2C2F212C72BEAA9F44790457281584F21681C
                                        SHA-512:4787C76489D4C552D50D26DF1D4A79DBC08DCC89A8B8CBAAA19E582CFDD5D393627C31BC6CFB8CA356434642BCD246EFB8A8EC59BE3B494A6923C54289581F27
                                        Malicious:true
                                        Reputation:low
                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                        C:\Users\user\AppData\Roaming\30ot4ffb.ida\Chrome\Default\Cookies
                                        Process:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):0.698304057893793
                                        Encrypted:false
                                        SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                                        MD5:3806E8153A55C1A2DA0B09461A9C882A
                                        SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                                        SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                                        SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        C:\Users\user\AppData\Roaming\iplcwcpzEHCt.exe
                                        Process:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):707584
                                        Entropy (8bit):7.411392432394974
                                        Encrypted:false
                                        SSDEEP:12288:glSq8Ssox252QHJcERkUE/+0UKwajvvQPOkg7v:gEq9fx2NRGUE/+4waDIxQ
                                        MD5:970BCE067AE6CDCF4CDF30A0A1F87186
                                        SHA1:75B2A8726790CA34DB04A003BA3547A1EB28F3FD
                                        SHA-256:F828F3F4109C84BC59B919C268C2D73ED8F1B327B3C3AFD64184C2DDF2AE3AA5
                                        SHA-512:3D57AA017EC7A22302DF6D299CC01EAA93BC26E649021FE25EF88EF8413D665EB1309AF6CAE7EC55B4D8D26C5095C37F0CB44398A6AAF39971A4E936F8833266
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Reputation:low
                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...J.................P..V...r....... ....... ....@.. .......................@............@.....................................W....`.............................................................................. ..................H...........qY...IUK..... ......................@....text....R.......T.................. ..`.rsrc.......`.......4..............@..@.reloc..............................@..B............. ...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        C:\Users\user\AppData\Roaming\iplcwcpzEHCt.exe:Zone.Identifier
                                        Process:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview: [ZoneTransfer]....ZoneId=0

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.411392432394974
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                        • Win32 Executable (generic) a (10002005/4) 49.96%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:Purchase_Order-Documents.exe
                                        File size:707584
                                        MD5:970bce067ae6cdcf4cdf30a0a1f87186
                                        SHA1:75b2a8726790ca34db04a003ba3547a1eb28f3fd
                                        SHA256:f828f3f4109c84bc59b919c268c2d73ed8f1b327b3c3afd64184c2ddf2ae3aa5
                                        SHA512:3d57aa017ec7a22302df6d299cc01eaa93bc26e649021fe25ef88ef8413d665eb1309af6cae7ec55b4d8d26c5095c37f0cb44398a6aaf39971a4e936f8833266
                                        SSDEEP:12288:glSq8Ssox252QHJcERkUE/+0UKwajvvQPOkg7v:gEq9fx2NRGUE/+4waDIxQ
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...J.................P..V...r....... ....... ....@.. .......................@............@................................

                                        File Icon

                                        Icon Hash:d086aab2b2aad403

                                        Static PE Info

                                        General

                                        Entrypoint:0x4b200a
                                        Entrypoint Section:
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0xE2E2904A [Tue Aug 15 16:48:10 2090 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v4.0.30319
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                        Entrypoint Preview

                                        Instruction
                                        jmp dword ptr [004B2000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x103c40x57.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x292f0.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0xb20000x8
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x100000x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        qYIUK0x20000xdb8c0xdc00False1.00046164773data7.99672559397IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                        .text0x100000x752b80x75400False0.887743203625data7.85454569485IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0x860000x292f00x29400False0.0759943181818data3.78905338519IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xb00000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        0xb20000x100x200False0.044921875data0.122275881259IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x862b00x1280PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                        RT_ICON0x875300x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 4283735867, next used block 4283735867
                                        RT_ICON0x97d580x94a8data
                                        RT_ICON0xa12000x5488data
                                        RT_ICON0xa66880x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
                                        RT_ICON0xaa8b00x25a8data
                                        RT_ICON0xace580x10a8data
                                        RT_ICON0xadf000x988data
                                        RT_ICON0xae8880x468GLS_BINARY_LSB_FIRST
                                        RT_GROUP_ICON0xaecf00x84data
                                        RT_VERSION0xaed740x390data
                                        RT_MANIFEST0xaf1040x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                        Imports

                                        DLLImport
                                        mscoree.dll_CorExeMain

                                        Version Infos

                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyrightCopyright Hotplates 2020-2021
                                        Assembly Version2.0.9.0
                                        InternalNameValueCollection.exe
                                        FileVersion2.0.9.0
                                        CompanyNameHotplates
                                        LegalTrademarks
                                        CommentsMLT
                                        ProductNameMedical Laboratory
                                        ProductVersion2.0.9.0
                                        FileDescriptionMedical Laboratory
                                        OriginalFilenameValueCollection.exe

                                        Network Behavior

                                        Snort IDS Alerts

                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        02/25/21-15:15:56.398431TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49736587192.168.2.5210.245.86.30
                                        02/25/21-15:16:00.980980TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49737587192.168.2.5210.245.86.30

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 25, 2021 15:15:53.859267950 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:54.120907068 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:54.121155977 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:54.802969933 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:54.803484917 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:55.068698883 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:55.074105024 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:55.338762045 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:55.339390993 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:55.606652975 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:55.607539892 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:55.867578983 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:55.867924929 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:56.133550882 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:56.134006977 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:56.394382954 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:56.394401073 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:56.398431063 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:56.398566961 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:56.398678064 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:56.398763895 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:56.656650066 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:56.656682014 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:56.724713087 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:56.766714096 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:57.667551041 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:57.930289984 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:57.930651903 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:57.930708885 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:57.935487032 CET49736587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:58.198956013 CET58749736210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:58.364896059 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:58.616486073 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:58.618292093 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:59.338344097 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:59.341984987 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:59.608027935 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:59.608469009 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:15:59.872970104 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:15:59.873589039 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.161842108 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:00.162549019 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.425728083 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:00.426069021 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.698580980 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:00.701538086 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.978655100 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:00.978672028 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:00.980613947 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.980979919 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.981322050 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.981331110 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.981564999 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.981827021 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.981928110 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:00.982665062 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:16:01.257108927 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:01.257538080 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:01.258142948 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:01.258312941 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:01.298628092 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:01.367521048 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:16:01.409432888 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:17:33.464570999 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:17:33.745942116 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:17:33.746258974 CET58749737210.245.86.30192.168.2.5
                                        Feb 25, 2021 15:17:33.746284008 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:17:33.746351004 CET49737587192.168.2.5210.245.86.30
                                        Feb 25, 2021 15:17:34.031064034 CET58749737210.245.86.30192.168.2.5

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 25, 2021 15:14:00.614456892 CET6206053192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:00.673077106 CET53620608.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:17.773355007 CET6180553192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:17.830391884 CET53618058.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:18.772814035 CET5479553192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:18.821708918 CET53547958.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:19.687643051 CET4955753192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:19.736459970 CET53495578.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:20.519609928 CET6173353192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:20.568279982 CET53617338.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:28.408837080 CET6544753192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:28.467767954 CET53654478.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:32.337611914 CET5244153192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:32.389306068 CET53524418.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:43.031414032 CET6217653192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:43.088355064 CET53621768.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:44.305552006 CET5959653192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:44.354703903 CET53595968.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:47.684875965 CET6529653192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:47.733829975 CET53652968.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:48.976933002 CET6318353192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:49.025506973 CET53631838.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:50.178472042 CET6015153192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:50.230242014 CET53601518.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:52.044712067 CET5696953192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:52.093455076 CET53569698.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:53.168992043 CET5516153192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:53.217766047 CET53551618.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:56.702155113 CET5475753192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:56.750999928 CET53547578.8.8.8192.168.2.5
                                        Feb 25, 2021 15:14:59.780395985 CET4999253192.168.2.58.8.8.8
                                        Feb 25, 2021 15:14:59.829229116 CET53499928.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:07.089879990 CET6007553192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:07.148258924 CET53600758.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:18.397152901 CET5501653192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:18.446222067 CET53550168.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:25.907023907 CET6434553192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:25.974898100 CET53643458.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:39.689004898 CET5712853192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:39.737688065 CET53571288.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:40.282181025 CET5479153192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:40.349874020 CET53547918.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:53.450650930 CET5046353192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:53.825484037 CET53504638.8.8.8192.168.2.5
                                        Feb 25, 2021 15:15:57.986135006 CET5039453192.168.2.58.8.8.8
                                        Feb 25, 2021 15:15:58.363188982 CET53503948.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:40.012384892 CET5853053192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:40.283049107 CET53585308.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:40.728240013 CET5381353192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:40.791915894 CET53538138.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:41.411791086 CET6373253192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:41.481204987 CET53637328.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:41.849817038 CET5734453192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:41.911187887 CET53573448.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:42.290951014 CET5445053192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:42.351074934 CET53544508.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:42.805290937 CET5926153192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:42.862632990 CET53592618.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:43.302687883 CET5715153192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:43.360616922 CET53571518.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:43.914323092 CET5941353192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:43.974423885 CET53594138.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:44.655744076 CET6051653192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:44.707451105 CET53605168.8.8.8192.168.2.5
                                        Feb 25, 2021 15:16:45.099301100 CET5164953192.168.2.58.8.8.8
                                        Feb 25, 2021 15:16:45.156717062 CET53516498.8.8.8192.168.2.5

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        Feb 25, 2021 15:15:53.450650930 CET192.168.2.58.8.8.80xdd23Standard query (0)mail.cuulongcorp.com.vnA (IP address)IN (0x0001)
                                        Feb 25, 2021 15:15:57.986135006 CET192.168.2.58.8.8.80xadbeStandard query (0)mail.cuulongcorp.com.vnA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        Feb 25, 2021 15:15:53.825484037 CET8.8.8.8192.168.2.50xdd23No error (0)mail.cuulongcorp.com.vn210.245.86.30A (IP address)IN (0x0001)
                                        Feb 25, 2021 15:15:58.363188982 CET8.8.8.8192.168.2.50xadbeNo error (0)mail.cuulongcorp.com.vn210.245.86.30A (IP address)IN (0x0001)

                                        SMTP Packets

                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Feb 25, 2021 15:15:54.802969933 CET58749736210.245.86.30192.168.2.5220 webhost56.fptdata.vn ESMTP Exim 4.92.3 Thu, 25 Feb 2021 21:15:54 +0700
                                        Feb 25, 2021 15:15:54.803484917 CET49736587192.168.2.5210.245.86.30EHLO 093954
                                        Feb 25, 2021 15:15:55.068698883 CET58749736210.245.86.30192.168.2.5250-webhost56.fptdata.vn Hello 093954 [84.17.52.78]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Feb 25, 2021 15:15:55.074105024 CET49736587192.168.2.5210.245.86.30AUTH login a2Vob2FjaEBjdXVsb25nY29ycC5jb20udm4=
                                        Feb 25, 2021 15:15:55.338762045 CET58749736210.245.86.30192.168.2.5334 UGFzc3dvcmQ6
                                        Feb 25, 2021 15:15:55.606652975 CET58749736210.245.86.30192.168.2.5235 Authentication succeeded
                                        Feb 25, 2021 15:15:55.607539892 CET49736587192.168.2.5210.245.86.30MAIL FROM:<kehoach@cuulongcorp.com.vn>
                                        Feb 25, 2021 15:15:55.867578983 CET58749736210.245.86.30192.168.2.5250 OK
                                        Feb 25, 2021 15:15:55.867924929 CET49736587192.168.2.5210.245.86.30RCPT TO:<khanhkythuats@davitecco.com>
                                        Feb 25, 2021 15:15:56.133550882 CET58749736210.245.86.30192.168.2.5250 Accepted
                                        Feb 25, 2021 15:15:56.134006977 CET49736587192.168.2.5210.245.86.30DATA
                                        Feb 25, 2021 15:15:56.394401073 CET58749736210.245.86.30192.168.2.5354 Enter message, ending with "." on a line by itself
                                        Feb 25, 2021 15:15:56.398763895 CET49736587192.168.2.5210.245.86.30.
                                        Feb 25, 2021 15:15:56.724713087 CET58749736210.245.86.30192.168.2.5250 OK id=1lFHQq-0001WJ-9B
                                        Feb 25, 2021 15:15:57.667551041 CET49736587192.168.2.5210.245.86.30QUIT
                                        Feb 25, 2021 15:15:57.930289984 CET58749736210.245.86.30192.168.2.5221 webhost56.fptdata.vn closing connection
                                        Feb 25, 2021 15:15:59.338344097 CET58749737210.245.86.30192.168.2.5220 webhost56.fptdata.vn ESMTP Exim 4.92.3 Thu, 25 Feb 2021 21:15:59 +0700
                                        Feb 25, 2021 15:15:59.341984987 CET49737587192.168.2.5210.245.86.30EHLO 093954
                                        Feb 25, 2021 15:15:59.608027935 CET58749737210.245.86.30192.168.2.5250-webhost56.fptdata.vn Hello 093954 [84.17.52.78]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Feb 25, 2021 15:15:59.608469009 CET49737587192.168.2.5210.245.86.30AUTH login a2Vob2FjaEBjdXVsb25nY29ycC5jb20udm4=
                                        Feb 25, 2021 15:15:59.872970104 CET58749737210.245.86.30192.168.2.5334 UGFzc3dvcmQ6
                                        Feb 25, 2021 15:16:00.161842108 CET58749737210.245.86.30192.168.2.5235 Authentication succeeded
                                        Feb 25, 2021 15:16:00.162549019 CET49737587192.168.2.5210.245.86.30MAIL FROM:<kehoach@cuulongcorp.com.vn>
                                        Feb 25, 2021 15:16:00.425728083 CET58749737210.245.86.30192.168.2.5250 OK
                                        Feb 25, 2021 15:16:00.426069021 CET49737587192.168.2.5210.245.86.30RCPT TO:<khanhkythuats@davitecco.com>
                                        Feb 25, 2021 15:16:00.698580980 CET58749737210.245.86.30192.168.2.5250 Accepted
                                        Feb 25, 2021 15:16:00.701538086 CET49737587192.168.2.5210.245.86.30DATA
                                        Feb 25, 2021 15:16:00.978672028 CET58749737210.245.86.30192.168.2.5354 Enter message, ending with "." on a line by itself
                                        Feb 25, 2021 15:16:00.982665062 CET49737587192.168.2.5210.245.86.30.
                                        Feb 25, 2021 15:16:01.367521048 CET58749737210.245.86.30192.168.2.5250 OK id=1lFHQu-0001WP-S2
                                        Feb 25, 2021 15:17:33.464570999 CET49737587192.168.2.5210.245.86.30QUIT
                                        Feb 25, 2021 15:17:33.745942116 CET58749737210.245.86.30192.168.2.5221 webhost56.fptdata.vn closing connection

                                        Code Manipulations

                                        Statistics

                                        CPU Usage

                                        Click to jump to process

                                        Memory Usage

                                        Click to jump to process

                                        High Level Behavior Distribution

                                        Click to dive into process behavior distribution

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:15:14:09
                                        Start date:25/02/2021
                                        Path:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\Desktop\Purchase_Order-Documents.exe'
                                        Imagebase:0x7e0000
                                        File size:707584 bytes
                                        MD5 hash:970BCE067AE6CDCF4CDF30A0A1F87186
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.243391572.0000000003062000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.243729384.0000000003C8B000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:15:14:13
                                        Start date:25/02/2021
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\iplcwcpzEHCt' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2A2.tmp'
                                        Imagebase:0x12b0000
                                        File size:185856 bytes
                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:15:14:13
                                        Start date:25/02/2021
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7ecfc0000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:15:14:14
                                        Start date:25/02/2021
                                        Path:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\Purchase_Order-Documents.exe
                                        Imagebase:0xcd0000
                                        File size:707584 bytes
                                        MD5 hash:970BCE067AE6CDCF4CDF30A0A1F87186
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.496530839.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.499561789.0000000003231000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        Disassembly

                                        Code Analysis

                                        Reset < >

                                          Executed Functions

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID: ($<$ntin
                                          • API String ID: 0-2777557274
                                          • Opcode ID: 0d44ad5f6d0d44fc50517a21e48f0d723ff9bba10a305f3462a7bb86d6eef219
                                          • Instruction ID: 9101492f516c2b9b44eb5383252f1079c22ee82846b0e2a77d266290a7ea3158
                                          • Opcode Fuzzy Hash: 0d44ad5f6d0d44fc50517a21e48f0d723ff9bba10a305f3462a7bb86d6eef219
                                          • Instruction Fuzzy Hash: A4A2B374E142198FDB18CF99C981ADDFBF2BF89304F25C199D608AB255DB30A981CF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID: <$@
                                          • API String ID: 0-1426351568
                                          • Opcode ID: 27764e70e6d0ee8aeda8da93bb58298dba4cde0bed5c1035877ed45c00aaf307
                                          • Instruction ID: 7ed1cae23adfcb9ac23f75399d7eccef5aa5bf999acb5488b2c805f6f9273748
                                          • Opcode Fuzzy Hash: 27764e70e6d0ee8aeda8da93bb58298dba4cde0bed5c1035877ed45c00aaf307
                                          • Instruction Fuzzy Hash: BB72C074A10219CFDB64CFA9C980ACDFBF2BF49705F1581A9E608AB212D7309E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0124100C
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: CheckDebuggerPresentRemote
                                          • String ID:
                                          • API String ID: 3662101638-0
                                          • Opcode ID: 0e27c39b6a39df874c2361c01c6bee6ac7bcc96383a4e08d98e3a4167402ab1a
                                          • Instruction ID: 9d94d5910c18ffa0072b515f63d03c86d20d921dab850a5b1fe1c98a1c15b1d6
                                          • Opcode Fuzzy Hash: 0e27c39b6a39df874c2361c01c6bee6ac7bcc96383a4e08d98e3a4167402ab1a
                                          • Instruction Fuzzy Hash: 8841E0B5D05299DFCB10CFA9D484AEEFBF0AF09310F14816AE454B7250D734A985CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0124100C
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: CheckDebuggerPresentRemote
                                          • String ID:
                                          • API String ID: 3662101638-0
                                          • Opcode ID: 13ef5f067bb887b7453c1a1c81dc330d0c65815fc2f9941ac2e74c59cb0da0e1
                                          • Instruction ID: b86e5337bceffa2fd5a043cead6f8be031c9f8a5665a774f5e3639d305e045c2
                                          • Opcode Fuzzy Hash: 13ef5f067bb887b7453c1a1c81dc330d0c65815fc2f9941ac2e74c59cb0da0e1
                                          • Instruction Fuzzy Hash: B341BCB5D05298DFCB00CFA9D484AEEFBF4AB09314F14905AE814B7350D778AA85CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7e99990ffc3f95a33a3058b9cb69abe31c4c5c4bf0245614c27bfaca80d033d7
                                          • Instruction ID: f89a01fd0eb527302698b7290bfc5c8364559eb87630de36b6cf23240c48d06a
                                          • Opcode Fuzzy Hash: 7e99990ffc3f95a33a3058b9cb69abe31c4c5c4bf0245614c27bfaca80d033d7
                                          • Instruction Fuzzy Hash: DAC1BC717016058FEB29EB76C560B6AB7F6AF88600F14846DD946DB2D8DF34EC01CB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9feab8df979dfea6db0b019039e7565d22cbb76780f1c89204c9a0276a9bdb8
                                          • Instruction ID: ad27152eb29e57c0cb0a2db8d221f30b2f40925b703098e9b34b35ec6d095746
                                          • Opcode Fuzzy Hash: b9feab8df979dfea6db0b019039e7565d22cbb76780f1c89204c9a0276a9bdb8
                                          • Instruction Fuzzy Hash: 6D31B074D05228DFDBA4EF69CA44BE9B7B1AB49304F5080EAD91DE3281DB349E858F50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d9ef10ba110ea59f9c24edaf87b130743065bca03250e9e0cdfe8667a7539f5
                                          • Instruction ID: 70039148f1b08f1cf1a8c2ec1c105357206cdea44f693ac4f69aa6a7f46addd8
                                          • Opcode Fuzzy Hash: 4d9ef10ba110ea59f9c24edaf87b130743065bca03250e9e0cdfe8667a7539f5
                                          • Instruction Fuzzy Hash: 6E118C30C052588FCB15AFA5D6187FEBFF0AB0E301F14A06AD851B3295C7748988CB79
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 012492B8
                                          • GetCurrentThread.KERNEL32 ref: 012492F5
                                          • GetCurrentProcess.KERNEL32 ref: 01249332
                                          • GetCurrentThreadId.KERNEL32 ref: 0124938B
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 3925b9b7283c847a0e50ba5748391bbd31aedf53ee61a0b594050826cefe5b96
                                          • Instruction ID: 339849e258c3f973d25acff593ded4d0a80f9d881ed4e92c5f09b3b95daed744
                                          • Opcode Fuzzy Hash: 3925b9b7283c847a0e50ba5748391bbd31aedf53ee61a0b594050826cefe5b96
                                          • Instruction Fuzzy Hash: DE5164B09107898FDB14CFA9D589BDEBFF0AF89308F248459E409B7394CB749984CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 012492B8
                                          • GetCurrentThread.KERNEL32 ref: 012492F5
                                          • GetCurrentProcess.KERNEL32 ref: 01249332
                                          • GetCurrentThreadId.KERNEL32 ref: 0124938B
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: d9ba13a7ed3a95fb0d13b6d5296c5b48e30ebb11117649ed48a417450cc249d1
                                          • Instruction ID: faed5ac41da372ef81b254c56ac3079f856a4321d7adaf4237d8ac965e240f3b
                                          • Opcode Fuzzy Hash: d9ba13a7ed3a95fb0d13b6d5296c5b48e30ebb11117649ed48a417450cc249d1
                                          • Instruction Fuzzy Hash: 925154B09107898FDB14CFA9D588BDEBFF0AF48318F248459E409B7394CB749984CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0E887E6F
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 478920da5e5adfd6c69a0f3b1d0eb89be683b9f82041e2244613c8d49198e3e9
                                          • Instruction ID: 04b4396779cba11b8cc73ec3bdfa4748ce74dc47511f7690484f1804c53a3742
                                          • Opcode Fuzzy Hash: 478920da5e5adfd6c69a0f3b1d0eb89be683b9f82041e2244613c8d49198e3e9
                                          • Instruction Fuzzy Hash: ADC11571D0026D8FDB20DFA4C981BEDBBB1AB49304F1095AAD959F7280EB745E85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0E887E6F
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 60bf7aee0cbd70c98c00db47825dbb9d8e2dd2579d22cca9fd967f5e526e7f2b
                                          • Instruction ID: 1e4f2579671deee5971ce4ca8da9c06dc5d2d485a11556a42f7825599f6e6dd2
                                          • Opcode Fuzzy Hash: 60bf7aee0cbd70c98c00db47825dbb9d8e2dd2579d22cca9fd967f5e526e7f2b
                                          • Instruction Fuzzy Hash: 65C11471D0026D8FDB20DFA4C981BEDBBB1BB49304F1095AAD959B7280EB745E85CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(?), ref: 0124E52A
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 84c182ba15524336e24b4ff7fe51e3093ba2decf7b4f7300c1b1bb20dbac0470
                                          • Instruction ID: f055a323df1815209cc5ed50b0ddb805fa059abe6a441e1420f9728efb5c052c
                                          • Opcode Fuzzy Hash: 84c182ba15524336e24b4ff7fe51e3093ba2decf7b4f7300c1b1bb20dbac0470
                                          • Instruction Fuzzy Hash: EE912470A10B098FEB29CF69D0856AABBF1FF48304F04892AE556E7750E734E845CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0E8878F3
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 2e6b8b6be3bbb7ad75fc07882490d98684237893b4fd9612f8bee3268834db44
                                          • Instruction ID: 47f5ef3ae8b13a7eb8a8edc959994e5e3e50de32c5772a265a20a07b5434227c
                                          • Opcode Fuzzy Hash: 2e6b8b6be3bbb7ad75fc07882490d98684237893b4fd9612f8bee3268834db44
                                          • Instruction Fuzzy Hash: 6C41BAB5D012589FCF00CFA9D984AEEFBF1BB49314F24902AE818B7240D735AA45CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0E8878F3
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: db7be44e86224903e6aa40ed404975134242c46718a0ebb733ddb4beb4e2bf4b
                                          • Instruction ID: 319a427187c4c8323ae1ac00d26d113d25a0c443372f8b6cae548e08290a2d3b
                                          • Opcode Fuzzy Hash: db7be44e86224903e6aa40ed404975134242c46718a0ebb733ddb4beb4e2bf4b
                                          • Instruction Fuzzy Hash: 9F419AB4D012589FCF00CFA9D984AEEFBF1BB49314F24902AE818B7250D735AA45CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0124954B
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: cc5e8fbf34a59d34ee6b3009db38f69fb5c2406754f2ac62c77ccb7b0134b8f5
                                          • Instruction ID: 9643e1b253766eed5e120e619a6318a52a9ae9664dc3b2c6fde0dad23369554d
                                          • Opcode Fuzzy Hash: cc5e8fbf34a59d34ee6b3009db38f69fb5c2406754f2ac62c77ccb7b0134b8f5
                                          • Instruction Fuzzy Hash: 564179B5D002589FCF00CFA9D584ADEBBF4BB09314F14902AE958B7310D334A945DF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0124954B
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: b99624a8d27250c55f409c284750f47403caa4593d5d5329c1c0d8f8e0b5cabd
                                          • Instruction ID: 1ebf86bd6d9d66e3460e31d89c78330c4c023e744fd864457bb8896ff1b27d17
                                          • Opcode Fuzzy Hash: b99624a8d27250c55f409c284750f47403caa4593d5d5329c1c0d8f8e0b5cabd
                                          • Instruction Fuzzy Hash: 944157B9D002589FCF00CFA9D984ADEBBF5BB09314F14906AE918BB310D335A985DF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0E887A2A
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 778dc3d3aea89b8f5847ff5f8b9d51ec8c00c3f3bafc3f5c80a027ec3cad8ff7
                                          • Instruction ID: eedb7820f7e7a930e63beb51f44eda82b7573749a6c4d9a38bd898f2e30356c7
                                          • Opcode Fuzzy Hash: 778dc3d3aea89b8f5847ff5f8b9d51ec8c00c3f3bafc3f5c80a027ec3cad8ff7
                                          • Instruction Fuzzy Hash: 3741A9B5D04298DFCF00CFA9D980AEEFBB1BB49314F14902AE914B7200D735AA45DF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0E887A2A
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 8cdae027e676e39abadf0f8b5b2d993749c16c497e38dfc38d3d8eb77fce9d85
                                          • Instruction ID: 876d278401dce94b1f737e23f4cd5ea8271a07597f756ea6a436972f060a8d32
                                          • Opcode Fuzzy Hash: 8cdae027e676e39abadf0f8b5b2d993749c16c497e38dfc38d3d8eb77fce9d85
                                          • Instruction Fuzzy Hash: 9941A8B4D04258DFCF00CFAAD980AEEFBB1BB09314F14A02AE914B7200D735AA45CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0E8877AA
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 4951b27ac0695e0ac8371f56b4c63be04b520caca1f0ecc6518e8974d866a361
                                          • Instruction ID: ab1235999317bee261a5047686a89d79f04ad6f86e3f1e346dc5dd734d5ca03e
                                          • Opcode Fuzzy Hash: 4951b27ac0695e0ac8371f56b4c63be04b520caca1f0ecc6518e8974d866a361
                                          • Instruction Fuzzy Hash: 7E31B5B8D002989FCF00CFA9D980ADEFBB1BB49310F10902AE914B7300D735A906CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0E8877AA
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 5c21d23c2404d128ecd560e6bdcd03db9299a3181a2a426dfd2b50d89bf4a793
                                          • Instruction ID: 23d6e41353f8394c9ad99ac60fba599dee2ab3be535a982f2365c1e982ea6240
                                          • Opcode Fuzzy Hash: 5c21d23c2404d128ecd560e6bdcd03db9299a3181a2a426dfd2b50d89bf4a793
                                          • Instruction Fuzzy Hash: 3231A6B8D042989FCF00CFA9D980ADEFBB1BB49314F10902AE915B7310D735A946CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(?,?,?), ref: 0124E852
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 8da044de31b3dc803ec92fbacf1c895bd6d288989a327308289f537b5998a6ff
                                          • Instruction ID: ec1974a16373b1c7454867f3974842348be000d6b64e7b10e0ca29f8a11e991a
                                          • Opcode Fuzzy Hash: 8da044de31b3dc803ec92fbacf1c895bd6d288989a327308289f537b5998a6ff
                                          • Instruction Fuzzy Hash: FA41A6B4D002589FDF14CFA9D884A9EFBF0BB49310F14942AE918B7320D378A946CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01242047
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 58d284a0376c8aea295ee377f799efb396f2d1575baa5fcf307654120dc3cfc4
                                          • Instruction ID: c0e5df8c253ecdbc76375381ca42d317eb8b235c744072249c65a11bd9b8b3c9
                                          • Opcode Fuzzy Hash: 58d284a0376c8aea295ee377f799efb396f2d1575baa5fcf307654120dc3cfc4
                                          • Instruction Fuzzy Hash: 783187B9D04258DFCB14CFA9E484AEEFBF1BB59310F14902AE814B7210D775A945CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01241137
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 2ea5e7a122aa9ce14fac92f79188466053d99fb53cdff36674131101acfec642
                                          • Instruction ID: 1d2405c7d9737bb242149f725a5a242a4ccc0f8b657d72b342cbf9815fc28383
                                          • Opcode Fuzzy Hash: 2ea5e7a122aa9ce14fac92f79188466053d99fb53cdff36674131101acfec642
                                          • Instruction Fuzzy Hash: 4D3187B5D042589FCB14CFA9D884AEEFBB0BF49314F24902AE818B7310D774AA45CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetThreadContext.KERNELBASE(?,?), ref: 0E887687
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: ContextThread
                                          • String ID:
                                          • API String ID: 1591575202-0
                                          • Opcode ID: 419f585df5e6de4317f8f0523a8d1c981cc7a29f54212938144b8b1bf55aff28
                                          • Instruction ID: 11c369a90b361316887253444abf00be4dd8fb22a8adde34888d90e8f525b92c
                                          • Opcode Fuzzy Hash: 419f585df5e6de4317f8f0523a8d1c981cc7a29f54212938144b8b1bf55aff28
                                          • Instruction Fuzzy Hash: F4419BB5D012589FCF10DFAAD984AEEBBF1AF49314F24802AE814B7240D779A949CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01241137
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: c075967588cdbaa8bb7252a8b2b9b6fbaf87c26c503557de57150de01de5bfff
                                          • Instruction ID: 213f393f7505014acbfa7f37f0a983f4d49697c91caa96a5ef1f6870ba58e6db
                                          • Opcode Fuzzy Hash: c075967588cdbaa8bb7252a8b2b9b6fbaf87c26c503557de57150de01de5bfff
                                          • Instruction Fuzzy Hash: 163176B9D042589FCF14CFA9E884ADEFBB4BB09310F14902AE818B7310D774A985CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01242047
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: bd3e61323076d50663a2cc5d17a58e6b84599d44811270b784ffbbd6ff0e1e91
                                          • Instruction ID: 805ff488888b674cda6e80a8160405ea3f4c50bf298d6943f3eba00f779a7f1e
                                          • Opcode Fuzzy Hash: bd3e61323076d50663a2cc5d17a58e6b84599d44811270b784ffbbd6ff0e1e91
                                          • Instruction Fuzzy Hash: EC3177B9D04258DFCB14CFAAE884ADEFBF1BB19310F14A02AE814B7210D775A945CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetThreadContext.KERNELBASE(?,?), ref: 0E887687
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: ContextThread
                                          • String ID:
                                          • API String ID: 1591575202-0
                                          • Opcode ID: d355b26a19af293f787aeac6689db5ea7c450fd5882f63b784e663d92903024f
                                          • Instruction ID: 997a211d79ac7ec8e142afd4a70ece46a401d899684431e404209eedb81936a4
                                          • Opcode Fuzzy Hash: d355b26a19af293f787aeac6689db5ea7c450fd5882f63b784e663d92903024f
                                          • Instruction Fuzzy Hash: 33319BB4D012589FCB10DFA9D984AEEBBF1AB49314F24802AE814B7240D739A949CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(?,?,?), ref: 0124E852
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: a46a748fb47594994e7040aa4c8939bd24d10d496aea7280dfae9626e3da5109
                                          • Instruction ID: 9635ea1e0aa8ea40cf4b43338463daa105187a339762ac6992059f5e7702952f
                                          • Opcode Fuzzy Hash: a46a748fb47594994e7040aa4c8939bd24d10d496aea7280dfae9626e3da5109
                                          • Instruction Fuzzy Hash: 7A3174B8D002589FDF14CFA9D984A9EFBF1BB48314F14942AE918B7320D734A946CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 0E88B36B
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 814b9b662672da36f7987564a825520b31983ffd9de7ea8dbc5289b7e41bca18
                                          • Instruction ID: e18ef09aa8367aa6be44992034c2681bd1e4a58bc4a48511363711d052877480
                                          • Opcode Fuzzy Hash: 814b9b662672da36f7987564a825520b31983ffd9de7ea8dbc5289b7e41bca18
                                          • Instruction Fuzzy Hash: B93187B8D05258AFCB10CFA9D984ADEFBF4AB59314F14901AE818B7320D375A945CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(?,?,?), ref: 0124E852
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 0899e32e645a685a97b64678f62fafee9cf3a0cea14615611a5c4eacef88b686
                                          • Instruction ID: d1e9114ffc8152d59ffc2e6d5641ea89a6e525833911853da40ecef3dedf57bf
                                          • Opcode Fuzzy Hash: 0899e32e645a685a97b64678f62fafee9cf3a0cea14615611a5c4eacef88b686
                                          • Instruction Fuzzy Hash: 273186B8D042599FDF04CFA9D884A9DFBF1BB49314F15942AE914B7320D334A946CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 0E88B36B
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: cbe0e9c30daef70bff8e53d0628756832181b78b6fff6a6227ece2ef6da6fc18
                                          • Instruction ID: 9ae2f580bbb1c30558f2ea215e62a5b01a7e5af26e47cdabba6b63fe2d9224ea
                                          • Opcode Fuzzy Hash: cbe0e9c30daef70bff8e53d0628756832181b78b6fff6a6227ece2ef6da6fc18
                                          • Instruction Fuzzy Hash: 5D3198B8D012589FCB10CFA9D984ADEFBF4BB59310F14901AE814B7320D334A945CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OutputDebugStringW.KERNELBASE(?), ref: 01242812
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: DebugOutputString
                                          • String ID:
                                          • API String ID: 1166629820-0
                                          • Opcode ID: e205429f850173f5e0d69c53fc8b4ad127ae20b471d0fe8fea954aac174c2ac2
                                          • Instruction ID: 56b1867f57825fc8cff22bad4609da1dd5d221c5c1b0d6be1c66ee845fd0b67d
                                          • Opcode Fuzzy Hash: e205429f850173f5e0d69c53fc8b4ad127ae20b471d0fe8fea954aac174c2ac2
                                          • Instruction Fuzzy Hash: AD31BDB4D00258DFCB14CFAAD584ADEFBF5AB49314F14802AE914B7310D774A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OutputDebugStringW.KERNELBASE(?), ref: 01242812
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: DebugOutputString
                                          • String ID:
                                          • API String ID: 1166629820-0
                                          • Opcode ID: 4ef79e5642cc77d91e86fcb7af394750cb17579ab7b8789c68bfcb592738e966
                                          • Instruction ID: f02f964d8dd0886d6cfa527c2d8fe3e172418e1d14c317596d55fa84d1225200
                                          • Opcode Fuzzy Hash: 4ef79e5642cc77d91e86fcb7af394750cb17579ab7b8789c68bfcb592738e966
                                          • Instruction Fuzzy Hash: 1D31A9B4D01258DFCB14CFAAD884ADEFBF1AB49314F14806AE918B7320D734A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 012428EE
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: f1e1d992970d1140c1b92992755a3b3fed3095853fe4ab8f59a25c0e7b49e76d
                                          • Instruction ID: 68e5ad87a4a2d0b3f76bf045aaa0f42927225cccc4cca7c217839030cb1afa07
                                          • Opcode Fuzzy Hash: f1e1d992970d1140c1b92992755a3b3fed3095853fe4ab8f59a25c0e7b49e76d
                                          • Instruction Fuzzy Hash: AD31FCB8C14258DFCB14CFAAE484AEEFBF0AB09224F14805AE914B3310C774A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(?), ref: 0124E52A
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 178e2c243d9aeaaa186c5e80b3da0d61024a90a58c55065be0d6bd9b12c50ee1
                                          • Instruction ID: 86ae8094cd75ff34b2e895830764c69990d02f379df09973852bc461b23b1edb
                                          • Opcode Fuzzy Hash: 178e2c243d9aeaaa186c5e80b3da0d61024a90a58c55065be0d6bd9b12c50ee1
                                          • Instruction Fuzzy Hash: 9131A8B4D002599FDB14CFA9E484ADEFBF5BB49314F14906AE818B7320E734A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 012428EE
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: a06993ad996d4909fee99bc8f86cd050ce83cc82fdab23e1381d8298f4a86ecd
                                          • Instruction ID: b4297b3aef01feb96bbddf4892fa4c68c172c40e6a28e573f1086a7d05b78de3
                                          • Opcode Fuzzy Hash: a06993ad996d4909fee99bc8f86cd050ce83cc82fdab23e1381d8298f4a86ecd
                                          • Instruction Fuzzy Hash: C831BBB8D00258DFDB14CFA9E484AEEFBF0AB49324F24905AE815B7311C734AA45CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ResumeThread.KERNELBASE(?), ref: 0E887566
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: ad7841725aa80d5d23386072243cddeabcbb984772dcdb835d2fe41a43dfe6da
                                          • Instruction ID: 256c7b8644d09ba917b227aab2a8bcfc823f096926438b38b2363ca5aeacc3e3
                                          • Opcode Fuzzy Hash: ad7841725aa80d5d23386072243cddeabcbb984772dcdb835d2fe41a43dfe6da
                                          • Instruction Fuzzy Hash: 7C31DDB4D012589FCF14CFA9D980ADEFBB4AF49314F14802AE815B7300D735A905CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 012428EE
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 80c3a04e24e4049116429e89869aa9a76da0a3b7796e9df0be02709c433d7f1b
                                          • Instruction ID: 5820a5fcc9276cc39bbdd699e41dbd93838fcb34b7e8ca3ab0c41bf3a5aeb8c8
                                          • Opcode Fuzzy Hash: 80c3a04e24e4049116429e89869aa9a76da0a3b7796e9df0be02709c433d7f1b
                                          • Instruction Fuzzy Hash: 7731EEB4D14258DFCB14CFAAE484AEEFBF4AB09324F14905AE914B3300C374A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ResumeThread.KERNELBASE(?), ref: 0E887566
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: fb28814d6b202f9f84f013866067c8a968686f9215e7922993b422353d567fdb
                                          • Instruction ID: edf174c329a524028cb46df1770e93d901d440abae973bee0deda5fb42b90c11
                                          • Opcode Fuzzy Hash: fb28814d6b202f9f84f013866067c8a968686f9215e7922993b422353d567fdb
                                          • Instruction Fuzzy Hash: 5431DBB4D012589FCF10CFA9D980ADEFBB4AF49314F24802AE819B7300DB35A905CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242075880.000000000115D000.00000040.00000001.sdmp, Offset: 0115D000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c4df01b630898b83276ca178eb39e675503039f956cefa24d63c735694eeb18
                                          • Instruction ID: de952bb038874632766a8b23e1b3e512529f23a412dac6dbc32d4cefa10575fe
                                          • Opcode Fuzzy Hash: 4c4df01b630898b83276ca178eb39e675503039f956cefa24d63c735694eeb18
                                          • Instruction Fuzzy Hash: A621F4B1504244DFDF49CF54E9C0B1ABB75FB8832CF258569ED054B206C336D845CBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242102531.000000000116D000.00000040.00000001.sdmp, Offset: 0116D000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 039d87308028e3848e95226f4202371c05505c4f3a31a452c511e15caeacb6f2
                                          • Instruction ID: 0129b85d7726b0ca99b16e9750ad3cfe40e8e99c39abd021d11b8f61feb080d4
                                          • Opcode Fuzzy Hash: 039d87308028e3848e95226f4202371c05505c4f3a31a452c511e15caeacb6f2
                                          • Instruction Fuzzy Hash: A72137B1604244DFDF19CF54E4C0B2ABB69FB88354F24C669E9894B246C337D817CB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242102531.000000000116D000.00000040.00000001.sdmp, Offset: 0116D000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9af211d1f8b9e8a88daaf4968fcfeead2a5897a36ee0fd17bb0e5e369b1ceae6
                                          • Instruction ID: e0b582b4cd4de677fc7b1456f26c9892e35cb64eb51b53d8aa0d36347fe19b20
                                          • Opcode Fuzzy Hash: 9af211d1f8b9e8a88daaf4968fcfeead2a5897a36ee0fd17bb0e5e369b1ceae6
                                          • Instruction Fuzzy Hash: B72192755093808FDB07CF24D990B15BF71EB46214F28C5DAD8898B667C33BD81ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242075880.000000000115D000.00000040.00000001.sdmp, Offset: 0115D000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                          • Instruction ID: 3873945accda5f2cdceae265672621f51f6d822dc3eb05bfb1eebb47d7212f17
                                          • Opcode Fuzzy Hash: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                          • Instruction Fuzzy Hash: B411AF76904280CFDF16CF54E5C4B16BF71FB84328F2486A9DC050B656C33AD45ACBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242075880.000000000115D000.00000040.00000001.sdmp, Offset: 0115D000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6e639bae928302751676c9a9fbe7840aa63c8ad4f05a5eeb1ebd1c9f6b63c4d
                                          • Instruction ID: 4d0e84d8870366528139a8ac830c9de818d880af28f86c073e023e34600331f2
                                          • Opcode Fuzzy Hash: b6e639bae928302751676c9a9fbe7840aa63c8ad4f05a5eeb1ebd1c9f6b63c4d
                                          • Instruction Fuzzy Hash: 4C01FC714087C4DAEB548A55DC80B66BB98EF4162CF09C15AEE245A24AC3749844C771
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242075880.000000000115D000.00000040.00000001.sdmp, Offset: 0115D000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: acdb3821595e33db70bc933c4dadd23cfe0138db53269f45ad57c98df03343ef
                                          • Instruction ID: 94d330be476e6aa8c1bea24d1262e64249a7226fe6f0e65572452ddef73cdb32
                                          • Opcode Fuzzy Hash: acdb3821595e33db70bc933c4dadd23cfe0138db53269f45ad57c98df03343ef
                                          • Instruction Fuzzy Hash: 49F096714047C4DEEB658A1ADCC4B62FFA8EF41638F18C45AED185B28BC3799844CBB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Non-executed Functions

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.241129224.00000000007E2000.00000040.00020000.sdmp, Offset: 007E0000, based on PE: true
                                          • Associated: 00000001.00000002.241116080.00000000007E0000.00000040.00020000.sdmp Download File
                                          • Associated: 00000001.00000002.241164858.00000000007F1000.00000002.00020000.sdmp Download File
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b4945559dba27c1183b7293842d657760d1578d53219cc59ac719bbdc200e63
                                          • Instruction ID: d6c258c4d553018570d87be44e4abd5a4fd6e5352514a2d3763f17de851423b4
                                          • Opcode Fuzzy Hash: 6b4945559dba27c1183b7293842d657760d1578d53219cc59ac719bbdc200e63
                                          • Instruction Fuzzy Hash: 81C2542140E7C24FD7134BB469326E6BFB6AE1722430E44D7C8C18F6A3E2151D6AE776
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID: Y
                                          • API String ID: 0-3233089245
                                          • Opcode ID: 5bab33537a7be43ffbae39c1f19da31f281eba35e1a7ace8b6206d4cde42e030
                                          • Instruction ID: 13b95e9b84eed79897d7ddf1b65dcc4f6a4410c4baab6fa806290f9663864cc6
                                          • Opcode Fuzzy Hash: 5bab33537a7be43ffbae39c1f19da31f281eba35e1a7ace8b6206d4cde42e030
                                          • Instruction Fuzzy Hash: DC51AEB1D057588FEB19CF678D0068AFAF3AFC5200F49C1FA895CAA265DB7409868F15
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID: Y
                                          • API String ID: 0-3233089245
                                          • Opcode ID: b5f4ceecfbe8d0889b3a7e2f4995673f05038c52af4229dc7de9a312233447d9
                                          • Instruction ID: 890c65bf1aeb731ee15c10084d952a5eee3100c93167fb7d0603e187126dbfce
                                          • Opcode Fuzzy Hash: b5f4ceecfbe8d0889b3a7e2f4995673f05038c52af4229dc7de9a312233447d9
                                          • Instruction Fuzzy Hash: AE4149B1E056588BEB1CCF6B8D4078EFAF7BFC8200F14C1BA991CA6215DB7009858F55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47b642d10006d8c3c6f4df492ec74e7b5121ee1f8324b60a1f8df5c4678739b8
                                          • Instruction ID: ea4f57b1a4eb3b7c540bced4f1a729f7cedb7253277772f5bf401e18033855a4
                                          • Opcode Fuzzy Hash: 47b642d10006d8c3c6f4df492ec74e7b5121ee1f8324b60a1f8df5c4678739b8
                                          • Instruction Fuzzy Hash: BA5238B16227168FDB14CF14F8CE1993FE1FF45324B916208E2515B6D2DBB8658ACF84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.242207632.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81810823434292561099209d5c3281f8afab248bff8ca621d02caf8b0849c551
                                          • Instruction ID: e8e677affbb750ef990e3323555e564f50b73f62da8d420dd81184a10a345b25
                                          • Opcode Fuzzy Hash: 81810823434292561099209d5c3281f8afab248bff8ca621d02caf8b0849c551
                                          • Instruction Fuzzy Hash: 9EA17E32E2061ACFCF09DFB5D8845EDBBB2FF95300B15816AE905AB221DB71A955CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 866dd0f795f5b017c782418f3a32e797c4725cb0f7baa7bc95473ab7c43b4b41
                                          • Instruction ID: 21753bc1156d334b9787951ede5d21a89e9efe2fbcb8c41ca641e14b99cd60bc
                                          • Opcode Fuzzy Hash: 866dd0f795f5b017c782418f3a32e797c4725cb0f7baa7bc95473ab7c43b4b41
                                          • Instruction Fuzzy Hash: 9FA17FB0E046298BDB64DF69D980BDCBBF1EF48304F5181E9D59CE6205EB309E998F44
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.249425210.000000000E880000.00000040.00000001.sdmp, Offset: 0E880000, based on PE: false
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 39a4c805cab5f0128bff6b611e5314ac93e1e16c629307aca4afd712e48f73cf
                                          • Instruction ID: cfc66bc8bae1722eb4bcc73f36e698fd9675a213b9c6ef2945ac83205c47ca6b
                                          • Opcode Fuzzy Hash: 39a4c805cab5f0128bff6b611e5314ac93e1e16c629307aca4afd712e48f73cf
                                          • Instruction Fuzzy Hash: 29014830D002588BDB149FAAC5187FEFAF1AB4E311F146069D804B3295D7358984CB79
                                          Uniqueness

                                          Uniqueness Score: -1.00%