Loading ...

Play interactive tourEdit tour

Analysis Report Ko4zQgTBHv.exe

Overview

General Information

Sample Name:Ko4zQgTBHv.exe
Analysis ID:412502
MD5:02bc365a934e558eb634e19dd2d33e64
SHA1:a7fcb0381c4f68ebea3dda4508a789a23eb9f637
SHA256:bd97a138f3c0b9b078c119bcb59793ceca55120411c95635cc4d12c01406c2cd
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Ko4zQgTBHv.exe (PID: 6484 cmdline: 'C:\Users\user\Desktop\Ko4zQgTBHv.exe' MD5: 02BC365A934E558EB634E19DD2D33E64)
    • schtasks.exe (PID: 6660 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vZvprBd' /XML 'C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Ko4zQgTBHv.exe (PID: 6704 cmdline: C:\Users\user\Desktop\Ko4zQgTBHv.exe MD5: 02BC365A934E558EB634E19DD2D33E64)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "jojo@glimpse-it.co@Mexico1.,mail.privateemail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.Ko4zQgTBHv.exe.3daed20.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Ko4zQgTBHv.exe.3daed20.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                4.2.Ko4zQgTBHv.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  4.2.Ko4zQgTBHv.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Ko4zQgTBHv.exe.3daed20.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "jojo@glimpse-it.co@Mexico1.,mail.privateemail.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\vZvprBd.exeReversingLabs: Detection: 34%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Ko4zQgTBHv.exeVirustotal: Detection: 21%Perma Link
                      Source: Ko4zQgTBHv.exeReversingLabs: Detection: 34%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\vZvprBd.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: Ko4zQgTBHv.exeJoe Sandbox ML: detected
                      Source: 4.2.Ko4zQgTBHv.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: Ko4zQgTBHv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Ko4zQgTBHv.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\BILGqcSRbt\src\obj\Debug\ScopelessEnumAttribute.pdb source: Ko4zQgTBHv.exe
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0B58CAD8
                      Source: global trafficTCP traffic: 192.168.2.6:49752 -> 198.54.122.60:587
                      Source: Joe Sandbox ViewIP Address: 198.54.122.60 198.54.122.60
                      Source: global trafficTCP traffic: 192.168.2.6:49752 -> 198.54.122.60:587
                      Source: unknownDNS traffic detected: queries for: mail.privateemail.com
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpString found in binary or memory: http://bplSZH.com
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://checkip.dyndns.org/
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599485446.00000000066CB000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSA
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.596057980.0000000002C3C000.00000004.00000001.sdmpString found in binary or memory: http://mail.privateemail.com
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342093039.0000000002D01000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/E
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/downloads/
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=1
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.html
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.htmlk
                      Source: Ko4zQgTBHv.exeString found in binary or memory: http://servermanager.miixit.org/report/reporter_index.php?name=
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmpString found in binary or memory: https://o3u5ap5OYRcXqxyqT.org
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmpString found in binary or memory: https://o3u5ap5OYRcXqxyqT.org8
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.c
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Ko4zQgTBHv.exeString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, Ko4zQgTBHv.exe, 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Ko4zQgTBHv.exeJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_00807DA20_2_00807DA2
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B583B180_2_0B583B18
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5893A00_2_0B5893A0
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5886600_2_0B588660
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B58A2180_2_0B58A218
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B588D080_2_0B588D08
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B583B090_2_0B583B09
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B585BD00_2_0B585BD0
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B585BCB0_2_0B585BCB
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5893900_2_0B589390
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5886510_2_0B588651
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B589E480_2_0B589E48
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B58A2070_2_0B58A207
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B589E390_2_0B589E39
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5866C80_2_0B5866C8
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5842F00_2_0B5842F0
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5842E10_2_0B5842E1
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5866B80_2_0B5866B8
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B58A5390_2_0B58A539
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5849980_2_0B584998
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5849930_2_0B584993
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B58A4500_2_0B58A450
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5800400_2_0B580040
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5840100_2_0B584010
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5800060_2_0B580006
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5840200_2_0B584020
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B588CFB0_2_0B588CFB
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B58A4A70_2_0B58A4A7
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_006C7DA24_2_006C7DA2
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_029146A04_2_029146A0
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_029145B04_2_029145B0
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_0291DA014_2_0291DA01
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D075404_2_05D07540
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D094F84_2_05D094F8
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D06C704_2_05D06C70
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D069284_2_05D06928
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_061956084_2_06195608
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_061906D04_2_061906D0
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\vZvprBd.exe BD97A138F3C0B9B078C119BCB59793CECA55120411C95635CC4D12C01406C2CD
                      Source: Ko4zQgTBHv.exeBinary or memory string: OriginalFilename vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.346803709.000000000BB10000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.347104132.000000000BC00000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.347104132.000000000BC00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameScopelessEnumAttribute.exeF vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: l,\\StringFileInfo\\000004B0\\OriginalFilename vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342228241.0000000002D99000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342093039.0000000002D01000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCYbtWKpyduSheqLLdYLNwktYyalD.exe4 vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exeBinary or memory string: OriginalFilename vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.593856787.0000000001010000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.592490851.0000000000B58000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCYbtWKpyduSheqLLdYLNwktYyalD.exe4 vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.593872285.0000000001020000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.593770195.0000000000F50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Ko4zQgTBHv.exe
                      Source: Ko4zQgTBHv.exeBinary or memory string: OriginalFilenameScopelessEnumAttribute.exeF vs Ko4zQgTBHv.exe
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: Ko4zQgTBHv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Ko4zQgTBHv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: vZvprBd.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@1/1
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile created: C:\Users\user\AppData\Roaming\vZvprBd.exeJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeMutant created: \Sessions\1\BaseNamedObjects\QUCIgI
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6668:120:WilError_01
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF3F1.tmpJump to behavior
                      Source: Ko4zQgTBHv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: Ko4zQgTBHv.exeVirustotal: Detection: 21%
                      Source: Ko4zQgTBHv.exeReversingLabs: Detection: 34%
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile read: C:\Users\user\Desktop\Ko4zQgTBHv.exe:Zone.IdentifierJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Ko4zQgTBHv.exe 'C:\Users\user\Desktop\Ko4zQgTBHv.exe'
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vZvprBd' /XML 'C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Users\user\Desktop\Ko4zQgTBHv.exe C:\Users\user\Desktop\Ko4zQgTBHv.exe
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vZvprBd' /XML 'C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Users\user\Desktop\Ko4zQgTBHv.exe C:\Users\user\Desktop\Ko4zQgTBHv.exeJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Ko4zQgTBHv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Ko4zQgTBHv.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Ko4zQgTBHv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\BILGqcSRbt\src\obj\Debug\ScopelessEnumAttribute.pdb source: Ko4zQgTBHv.exe
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0080761D push es; retf 0_2_0080764E
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_00807656 push es; retf 0_2_00807684
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 0_2_0B5847DB push esi; retf 0_2_0B5847E4
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_006C7656 push es; retf 4_2_006C7684
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_006C761D push es; retf 4_2_006C764E
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D025C3 push esp; retf 4_2_05D025E2
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D025F3 push ebp; retf 4_2_05D02602
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D025B3 push ebx; retf 4_2_05D025C2
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D025A3 push edx; retf 4_2_05D025B2
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D0257C push eax; retf 4_2_05D02582
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D02663 push 0A6405CAh; retf 4_2_05D0267E
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D02603 push edi; retf 4_2_05D02622
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D021C9 push ecx; retf 0005h4_2_05D021CA
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D01140 push ds; retf 4_2_05D0114E
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D050F7 push edi; retf 4_2_05D050FE
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D01048 push ds; retf 4_2_05D0105A
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D01077 push ds; retf 4_2_05D01078
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D01068 push ds; retf 4_2_05D01069
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D0B374 push 968C00CCh; retf 0005h4_2_05D0B37A
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D052D0 push edi; retf 4_2_05D052D6
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D0122B push ds; retf 4_2_05D01236
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D0BCC0 pushfd ; retf 0005h4_2_05D0BEBA
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D0BF08 pushfd ; retf 0005h4_2_05D0BF0A
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D04EEC push ebp; retf 4_2_05D04EF6
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89033690485
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89033690485
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile created: C:\Users\user\AppData\Roaming\vZvprBd.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vZvprBd' /XML 'C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp'
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Ko4zQgTBHv.exe PID: 6484, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWindow / User API: threadDelayed 355Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWindow / User API: threadDelayed 9462Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6488Thread sleep time: -104535s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6488Thread sleep time: -40000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6512Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6720Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6920Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6924Thread sleep count: 355 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6924Thread sleep count: 9462 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exe TID: 6920Thread sleep count: 39 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 104535Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 40000Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Ko4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeMemory written: C:\Users\user\Desktop\Ko4zQgTBHv.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vZvprBd' /XML 'C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeProcess created: C:\Users\user\Desktop\Ko4zQgTBHv.exe C:\Users\user\Desktop\Ko4zQgTBHv.exeJump to behavior
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.594238544.00000000014F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.594238544.00000000014F0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.594238544.00000000014F0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
                      Source: Ko4zQgTBHv.exe, 00000004.00000002.594238544.00000000014F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Users\user\Desktop\Ko4zQgTBHv.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Users\user\Desktop\Ko4zQgTBHv.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeCode function: 4_2_05D05A94 GetUserNameW,4_2_05D05A94
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Ko4zQgTBHv.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Ko4zQgTBHv.exe PID: 6704, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Ko4zQgTBHv.exe PID: 6484, type: MEMORY
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Ko4zQgTBHv.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\Ko4zQgTBHv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Ko4zQgTBHv.exe PID: 6704, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Ko4zQgTBHv.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Ko4zQgTBHv.exe PID: 6704, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Ko4zQgTBHv.exe PID: 6484, type: MEMORY
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Ko4zQgTBHv.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Ko4zQgTBHv.exe.3daed20.3.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Obfuscated Files or Information3Input Capture11File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Software Packing3Credentials in Registry1System Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery321SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncVirtualization/Sandbox Evasion141Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 412502 Sample: Ko4zQgTBHv.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 29 Found malware configuration 2->29 31 Multi AV Scanner detection for dropped file 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 6 other signatures 2->35 7 Ko4zQgTBHv.exe 7 2->7         started        process3 file4 19 C:\Users\user\AppData\Roaming\vZvprBd.exe, PE32 7->19 dropped 21 C:\Users\user\...\vZvprBd.exe:Zone.Identifier, ASCII 7->21 dropped 23 C:\Users\user\AppData\Local\...\tmpF3F1.tmp, XML 7->23 dropped 25 C:\Users\user\AppData\...\Ko4zQgTBHv.exe.log, ASCII 7->25 dropped 37 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->37 39 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->39 41 Uses schtasks.exe or at.exe to add and modify task schedules 7->41 43 Injects a PE file into a foreign processes 7->43 11 Ko4zQgTBHv.exe 2 7->11         started        15 schtasks.exe 1 7->15         started        signatures5 process6 dnsIp7 27 mail.privateemail.com 198.54.122.60, 49752, 587 NAMECHEAP-NETUS United States 11->27 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->45 47 Tries to steal Mail credentials (via file access) 11->47 49 Tries to harvest and steal ftp login credentials 11->49 51 2 other signatures 11->51 17 conhost.exe 15->17         started        signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Ko4zQgTBHv.exe22%VirustotalBrowse
                      Ko4zQgTBHv.exe34%ReversingLabsByteCode-MSIL.Trojan.Wacatac
                      Ko4zQgTBHv.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\vZvprBd.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\vZvprBd.exe34%ReversingLabsByteCode-MSIL.Trojan.Wacatac

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.Ko4zQgTBHv.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSA0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.htmlk0%Avira URL Cloudsafe
                      https://sectigo.c0%Avira URL Cloudsafe
                      https://o3u5ap5OYRcXqxyqT.org80%Avira URL Cloudsafe
                      http://bplSZH.com0%Avira URL Cloudsafe
                      https://o3u5ap5OYRcXqxyqT.org0%Avira URL Cloudsafe
                      http://checkip.dyndns.org/0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=10%Avira URL Cloudsafe
                      http://servermanager.miixit.org/E0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.html0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/report/reporter_index.php?name=0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://servermanager.miixit.org/downloads/0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.privateemail.com
                      198.54.122.60
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1Ko4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSKo4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0Ko4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haKo4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://crt.sectigo.com/SectigoRSAKo4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://mail.privateemail.comKo4zQgTBHv.exe, 00000004.00000002.596057980.0000000002C3C000.00000004.00000001.sdmpfalse
                          high
                          http://servermanager.miixit.org/index_ru.htmlkKo4zQgTBHv.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssKo4zQgTBHv.exe, 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmpfalse
                            high
                            https://sectigo.cKo4zQgTBHv.exe, 00000004.00000002.599388925.0000000006690000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://o3u5ap5OYRcXqxyqT.org8Ko4zQgTBHv.exe, 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://bplSZH.comKo4zQgTBHv.exe, 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://o3u5ap5OYRcXqxyqT.orgKo4zQgTBHv.exe, 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://checkip.dyndns.org/Ko4zQgTBHv.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/hits/hit_index.php?k=1Ko4zQgTBHv.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPCKo4zQgTBHv.exefalse
                              high
                              http://servermanager.miixit.org/EKo4zQgTBHv.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://servermanager.miixit.org/index_ru.htmlKo4zQgTBHv.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://servermanager.miixit.org/report/reporter_index.php?name=Ko4zQgTBHv.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://servermanager.miixit.org/Ko4zQgTBHv.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKo4zQgTBHv.exe, 00000000.00000002.342093039.0000000002D01000.00000004.00000001.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipKo4zQgTBHv.exe, 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, Ko4zQgTBHv.exe, 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://servermanager.miixit.org/downloads/Ko4zQgTBHv.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://servermanager.miixit.org/hits/hit_index.php?k=Ko4zQgTBHv.exefalse
                                • Avira URL Cloud: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                198.54.122.60
                                mail.privateemail.comUnited States
                                22612NAMECHEAP-NETUSfalse

                                General Information

                                Joe Sandbox Version:32.0.0 Black Diamond
                                Analysis ID:412502
                                Start date:12.05.2021
                                Start time:18:31:17
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 8m 55s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:Ko4zQgTBHv.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:24
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@6/4@1/1
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 96%
                                • Number of executed functions: 49
                                • Number of non-executed functions: 15
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Excluded IPs from analysis (whitelisted): 92.122.145.220, 13.88.21.125, 52.255.188.83, 131.253.33.200, 13.107.22.200, 20.49.157.6, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 2.20.143.16, 2.20.142.209, 20.82.210.154, 184.30.24.56
                                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                18:32:11API Interceptor712x Sleep call for process: Ko4zQgTBHv.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                198.54.122.60wed.docGet hashmaliciousBrowse
                                  ORDER CONFIRMATION.docGet hashmaliciousBrowse
                                    SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                                      6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                                        RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                                          337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                                            vy38Kw9qRh.exeGet hashmaliciousBrowse
                                              ePj6KfzLBxh4vbe.exeGet hashmaliciousBrowse
                                                zkXpISzeo3.exeGet hashmaliciousBrowse
                                                  yl9KgwwOXDZoGMw.exeGet hashmaliciousBrowse
                                                    8DL3LHg4SB6Q7z2.exeGet hashmaliciousBrowse
                                                      01217a79_by_Libranalysis.exeGet hashmaliciousBrowse
                                                        5iRqi4LmLF.exeGet hashmaliciousBrowse
                                                          6f37L7HNqo.exeGet hashmaliciousBrowse
                                                            IqRG5ZzYOH.exeGet hashmaliciousBrowse
                                                              PO 4302003683.docGet hashmaliciousBrowse
                                                                Tender Overview 10052021.docGet hashmaliciousBrowse
                                                                  ORDER 10.05.docGet hashmaliciousBrowse
                                                                    purchase request.docGet hashmaliciousBrowse
                                                                      lBKwquZfBhdeO7D.exeGet hashmaliciousBrowse

                                                                        Domains

                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        mail.privateemail.comwed.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        ORDER CONFIRMATION.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        vy38Kw9qRh.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        ePj6KfzLBxh4vbe.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        zkXpISzeo3.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        yl9KgwwOXDZoGMw.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        8DL3LHg4SB6Q7z2.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        01217a79_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        5iRqi4LmLF.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        6f37L7HNqo.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        IqRG5ZzYOH.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        PO 4302003683.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        Tender Overview 10052021.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        ORDER 10.05.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        purchase request.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        New order.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60

                                                                        ASN

                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        NAMECHEAP-NETUSPurchase Order.exeGet hashmaliciousBrowse
                                                                        • 198.54.126.165
                                                                        wed.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        ORDER CONFIRMATION.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                                                                        • 198.54.117.216
                                                                        main_setup_x86x64.exeGet hashmaliciousBrowse
                                                                        • 162.255.119.164
                                                                        00098765123POIIU.exeGet hashmaliciousBrowse
                                                                        • 199.192.23.253
                                                                        e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                                                                        • 185.61.154.27
                                                                        2021_May_Quotation_pdf.exeGet hashmaliciousBrowse
                                                                        • 198.54.115.133
                                                                        337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        Citvonvhciktufwvyzyhistnewdjgsoqdr.exeGet hashmaliciousBrowse
                                                                        • 198.54.117.212
                                                                        Updated Order list -804333.exeGet hashmaliciousBrowse
                                                                        • 198.54.115.56
                                                                        NAVTECO_R1_10_05_2021,pdf.exeGet hashmaliciousBrowse
                                                                        • 198.54.117.212
                                                                        BELLOW FABRICATION Dwg.exeGet hashmaliciousBrowse
                                                                        • 199.188.200.15
                                                                        file.exeGet hashmaliciousBrowse
                                                                        • 198.54.115.133
                                                                        scan of document 5336227.xlsmGet hashmaliciousBrowse
                                                                        • 162.0.233.152
                                                                        vy38Kw9qRh.exeGet hashmaliciousBrowse
                                                                        • 198.54.122.60
                                                                        copy of order 9119.xlsmGet hashmaliciousBrowse
                                                                        • 162.0.233.152

                                                                        JA3 Fingerprints

                                                                        No context

                                                                        Dropped Files

                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        C:\Users\user\AppData\Roaming\vZvprBd.exewed.docGet hashmaliciousBrowse

                                                                          Created / dropped Files

                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ko4zQgTBHv.exe.log
                                                                          Process:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:modified
                                                                          Size (bytes):1314
                                                                          Entropy (8bit):5.350128552078965
                                                                          Encrypted:false
                                                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                          Malicious:true
                                                                          Reputation:high, very likely benign file
                                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                          C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp
                                                                          Process:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1652
                                                                          Entropy (8bit):5.156693657693423
                                                                          Encrypted:false
                                                                          SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3vtn:cbha7JlNQV/rydbz9I3YODOLNdq3r
                                                                          MD5:9D4A23205956BC2E8DD228033AC5726E
                                                                          SHA1:7565F73DAB98820902B657E8C7DE52AAB948E3C7
                                                                          SHA-256:F12E060679B837A16C1F0D231F1B345125EE56C69858B4C9E44EDBBEF06EF4AD
                                                                          SHA-512:88F2BBFC08C1EC83DC5FF994995542D9C3752E2201C3557D20614CFF32DF100CFD3F90B358A877F8C2ED1F9EBD55ED83B4EA8A5A565726CA1D3221336C5BEFAD
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                          C:\Users\user\AppData\Roaming\vZvprBd.exe
                                                                          Process:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):971264
                                                                          Entropy (8bit):7.869815902345992
                                                                          Encrypted:false
                                                                          SSDEEP:12288:PYh5qL6Evo89A05qLcAwwhFsHF5xucMfz3fwXJ3CPBAEV4e1g5qLq:PY3I6jw9IcAyHFcfz3f8itCe1+Iq
                                                                          MD5:02BC365A934E558EB634E19DD2D33E64
                                                                          SHA1:A7FCB0381C4F68EBEA3DDA4508A789A23EB9F637
                                                                          SHA-256:BD97A138F3C0B9B078C119BCB59793CECA55120411C95635CC4D12C01406C2CD
                                                                          SHA-512:E261643D2BFEA93CE7A907D344F19AD995519F172DEE9E9F028DEDD8C9565CD92ACD53F571078B026C62FEF70F0561060CFA7A18800EEC2F833E4D84B057D02A
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 34%
                                                                          Joe Sandbox View:
                                                                          • Filename: wed.doc, Detection: malicious, Browse
                                                                          Reputation:low
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c.`..............P......8......6.... ........@.. ....................... ............@....................................O........4........................................................................... ............... ..H............text...<.... ...................... ..`.rsrc....4.......6..................@..@.reloc..............................@..B........................H.......xr..<............................................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*.0..<........~.....(3.....,!r...p.....(4...o5...s6............~.....+..*.0......
                                                                          C:\Users\user\AppData\Roaming\vZvprBd.exe:Zone.Identifier
                                                                          Process:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Reputation:high, very likely benign file
                                                                          Preview: [ZoneTransfer]....ZoneId=0

                                                                          Static File Info

                                                                          General

                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):7.869815902345992
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Windows Screen Saver (13104/52) 0.07%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          File name:Ko4zQgTBHv.exe
                                                                          File size:971264
                                                                          MD5:02bc365a934e558eb634e19dd2d33e64
                                                                          SHA1:a7fcb0381c4f68ebea3dda4508a789a23eb9f637
                                                                          SHA256:bd97a138f3c0b9b078c119bcb59793ceca55120411c95635cc4d12c01406c2cd
                                                                          SHA512:e261643d2bfea93ce7a907d344f19ad995519f172dee9e9f028dedd8c9565cd92acd53f571078b026c62fef70f0561060cfa7a18800eec2f833e4d84b057d02a
                                                                          SSDEEP:12288:PYh5qL6Evo89A05qLcAwwhFsHF5xucMfz3fwXJ3CPBAEV4e1g5qLq:PY3I6jw9IcAyHFcfz3f8itCe1+Iq
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c.`..............P......8......6.... ........@.. ....................... ............@................................

                                                                          File Icon

                                                                          Icon Hash:f2d2e9fcc4ead362

                                                                          Static PE Info

                                                                          General

                                                                          Entrypoint:0x4eb636
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                          Time Stamp:0x609B63E3 [Wed May 12 05:13:07 2021 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:v4.0.30319
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                          Entrypoint Preview

                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al

                                                                          Data Directories

                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xeb5e40x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xec0000x34d4.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xeb4ac0x1c.text
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                          Sections

                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000xe963c0xe9800False0.909726520677data7.89033690485IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0xec0000x34d40x3600False0.361689814815data5.25516289643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0xf00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                          Resources

                                                                          NameRVASizeTypeLanguageCountry
                                                                          RT_ICON0xec1000x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                          RT_GROUP_ICON0xee6b80x14data
                                                                          RT_VERSION0xee6dc0x37cdata
                                                                          RT_MANIFEST0xeea680xa65XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                          Imports

                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain

                                                                          Version Infos

                                                                          DescriptionData
                                                                          Translation0x0000 0x04b0
                                                                          LegalCopyrightCopyright 2013
                                                                          Assembly Version3.0.0.0
                                                                          InternalNameScopelessEnumAttribute.exe
                                                                          FileVersion3.0.0.0
                                                                          CompanyName
                                                                          LegalTrademarks
                                                                          Comments
                                                                          ProductNameServerManager_Core
                                                                          ProductVersion3.0.0.0
                                                                          FileDescriptionServerManager_Core
                                                                          OriginalFilenameScopelessEnumAttribute.exe

                                                                          Network Behavior

                                                                          Network Port Distribution

                                                                          TCP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          May 12, 2021 18:33:57.590287924 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:57.782218933 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:57.782362938 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:57.973872900 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:57.974586010 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.164808035 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.165076017 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.169214010 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.359529018 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.402468920 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.430995941 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.622334957 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.623831987 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.623858929 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.623883009 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.623905897 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.624061108 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.624207973 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.675378084 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:58.865664005 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.866667986 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:58.918052912 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:59.144306898 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:59.334512949 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.336196899 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.341310024 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:59.531418085 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.534073114 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.535981894 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:59.728559971 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.731681108 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.732639074 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:33:59.922954082 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.925484896 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:33:59.926291943 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:34:00.116590023 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.157192945 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.158485889 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:34:00.348891020 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.349466085 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.352077007 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:34:00.352103949 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:34:00.353277922 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:34:00.353303909 CEST49752587192.168.2.6198.54.122.60
                                                                          May 12, 2021 18:34:00.542407036 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.542478085 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.544215918 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.632358074 CEST58749752198.54.122.60192.168.2.6
                                                                          May 12, 2021 18:34:00.683339119 CEST49752587192.168.2.6198.54.122.60

                                                                          UDP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          May 12, 2021 18:32:01.505918980 CEST5451353192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:01.567689896 CEST53545138.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:01.654706001 CEST6204453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:01.708113909 CEST53620448.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:02.769505978 CEST6379153192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:02.831269979 CEST53637918.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:03.903897047 CEST6426753192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:03.955429077 CEST53642678.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:05.422872066 CEST4944853192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:05.471720934 CEST53494488.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:06.750407934 CEST6034253192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:06.799278021 CEST53603428.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:07.854561090 CEST6134653192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:07.903265953 CEST53613468.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:08.032258987 CEST5177453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:08.102324009 CEST53517748.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:08.895251036 CEST5602353192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:08.946938038 CEST53560238.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:10.643033981 CEST5838453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:10.693039894 CEST53583848.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:12.426206112 CEST6026153192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:12.476443052 CEST53602618.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:13.700006008 CEST5606153192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:13.751530886 CEST53560618.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:14.812074900 CEST5833653192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:14.860830069 CEST53583368.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:16.004043102 CEST5378153192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:16.052792072 CEST53537818.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:17.855899096 CEST5406453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:17.907633066 CEST53540648.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:18.961852074 CEST5281153192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:19.010551929 CEST53528118.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:20.196566105 CEST5529953192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:20.245496988 CEST53552998.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:21.418642044 CEST6374553192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:21.471422911 CEST53637458.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:22.550496101 CEST5005553192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:22.602402925 CEST53500558.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:35.321342945 CEST6137453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:35.395571947 CEST53613748.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:39.164099932 CEST5033953192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:39.225599051 CEST53503398.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:54.132843971 CEST6330753192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:54.192929029 CEST53633078.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:54.744596958 CEST4969453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:54.795043945 CEST53496948.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:55.451318026 CEST5498253192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:55.500478029 CEST53549828.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:55.809406042 CEST5001053192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:55.882838964 CEST53500108.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:55.922677994 CEST6371853192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:55.984842062 CEST53637188.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:56.285636902 CEST6211653192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:56.347177029 CEST53621168.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:56.502953053 CEST6381653192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:56.551727057 CEST53638168.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:57.149645090 CEST5501453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:57.201231003 CEST53550148.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:57.670654058 CEST6220853192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:57.729873896 CEST53622088.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:58.704262972 CEST5757453192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:58.763200998 CEST53575748.8.8.8192.168.2.6
                                                                          May 12, 2021 18:32:59.693232059 CEST5181853192.168.2.68.8.8.8
                                                                          May 12, 2021 18:32:59.750224113 CEST53518188.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:00.341689110 CEST5662853192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:00.390507936 CEST53566288.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:09.605097055 CEST6077853192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:09.677778959 CEST53607788.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:10.886634111 CEST5379953192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:10.946465015 CEST53537998.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:12.776998997 CEST5468353192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:12.836379051 CEST53546838.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:39.965634108 CEST5932953192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:40.040384054 CEST53593298.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:44.842503071 CEST6402153192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:44.916666985 CEST53640218.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:46.437069893 CEST5612953192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:46.505568027 CEST53561298.8.8.8192.168.2.6
                                                                          May 12, 2021 18:33:57.399168015 CEST5817753192.168.2.68.8.8.8
                                                                          May 12, 2021 18:33:57.461641073 CEST53581778.8.8.8192.168.2.6

                                                                          DNS Queries

                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                          May 12, 2021 18:33:57.399168015 CEST192.168.2.68.8.8.80x7f74Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)

                                                                          DNS Answers

                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                          May 12, 2021 18:33:57.461641073 CEST8.8.8.8192.168.2.60x7f74No error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)

                                                                          SMTP Packets

                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                          May 12, 2021 18:33:57.973872900 CEST58749752198.54.122.60192.168.2.6220 PrivateEmail.com Mail Node
                                                                          May 12, 2021 18:33:57.974586010 CEST49752587192.168.2.6198.54.122.60EHLO 088753
                                                                          May 12, 2021 18:33:58.165076017 CEST58749752198.54.122.60192.168.2.6250-MTA-09.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          May 12, 2021 18:33:58.169214010 CEST49752587192.168.2.6198.54.122.60STARTTLS
                                                                          May 12, 2021 18:33:58.359529018 CEST58749752198.54.122.60192.168.2.6220 Ready to start TLS

                                                                          Code Manipulations

                                                                          Statistics

                                                                          CPU Usage

                                                                          Click to jump to process

                                                                          Memory Usage

                                                                          Click to jump to process

                                                                          High Level Behavior Distribution

                                                                          Click to dive into process behavior distribution

                                                                          Behavior

                                                                          Click to jump to process

                                                                          System Behavior

                                                                          General

                                                                          Start time:18:32:09
                                                                          Start date:12/05/2021
                                                                          Path:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Users\user\Desktop\Ko4zQgTBHv.exe'
                                                                          Imagebase:0x800000
                                                                          File size:971264 bytes
                                                                          MD5 hash:02BC365A934E558EB634E19DD2D33E64
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.342175940.0000000002D4E000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.343072283.0000000003D01000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          General

                                                                          Start time:18:32:13
                                                                          Start date:12/05/2021
                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vZvprBd' /XML 'C:\Users\user\AppData\Local\Temp\tmpF3F1.tmp'
                                                                          Imagebase:0x340000
                                                                          File size:185856 bytes
                                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:18:32:14
                                                                          Start date:12/05/2021
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff61de10000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:18:32:14
                                                                          Start date:12/05/2021
                                                                          Path:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\Ko4zQgTBHv.exe
                                                                          Imagebase:0x6c0000
                                                                          File size:971264 bytes
                                                                          MD5 hash:02BC365A934E558EB634E19DD2D33E64
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.591708318.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.595056596.0000000002B01000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.595643681.0000000002BB0000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          Disassembly

                                                                          Code Analysis

                                                                          Reset < >

                                                                            Executed Functions

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9410e60533cb0a714430fbc164edddad4086d516f77af4d051556a701dacbace
                                                                            • Instruction ID: e23db745a8f1344ce75b7ed542200470964acdea230c0212fc483c29cc7024b9
                                                                            • Opcode Fuzzy Hash: 9410e60533cb0a714430fbc164edddad4086d516f77af4d051556a701dacbace
                                                                            • Instruction Fuzzy Hash: 4CD16734E16208DFEB54DFA4D945BDDBBB2FB89700F209869E409BB384DB759D018B24
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4ec8a2cbda854a9b91a53b3950b925b9aed0137e72206411f46ebaaf8d0cbc11
                                                                            • Instruction ID: bf0779849d81001a9599fb776cf464fc2ced022c9e2af738d1631cb71ba1ab2e
                                                                            • Opcode Fuzzy Hash: 4ec8a2cbda854a9b91a53b3950b925b9aed0137e72206411f46ebaaf8d0cbc11
                                                                            • Instruction Fuzzy Hash: 71D16734E16208DFEB54DFA4D945BDEBBB2FB89700F209469E409BB384DB759D018B24
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 55d7e8524686976e8427565e26c1e7a7de42b016e2ec00c82044303310576fe6
                                                                            • Instruction ID: 3368d4348c0f9240b26c1675d942ede325c4bbf354aa4d4ae168a7e4ab99585c
                                                                            • Opcode Fuzzy Hash: 55d7e8524686976e8427565e26c1e7a7de42b016e2ec00c82044303310576fe6
                                                                            • Instruction Fuzzy Hash: 87B128B4E052198FDB04DFE9C5815AEFBF2FF88710F1485A6E415BB368D73099428B68
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e2ff02162cb2f717b2ef84a923c612d9961d644da71bde390b8ccd8c52e55bce
                                                                            • Instruction ID: 1c60b0a6095486331a7e62355c89d0dd20934a3301d08ae0c13023bccf707d74
                                                                            • Opcode Fuzzy Hash: e2ff02162cb2f717b2ef84a923c612d9961d644da71bde390b8ccd8c52e55bce
                                                                            • Instruction Fuzzy Hash: 7EB128B4E052098BDB04DFE9C5815DEFBF2BF88710F1485A5E415BB358D73099428B68
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6a9325ad8c8a633399401bdfb21f3ef7d680fdc45c8e2e4627c92b6372fe11e4
                                                                            • Instruction ID: d244f15c4e246ac3531fce5e2286bdfffd38b8be29bec0cda9530882d1e59d45
                                                                            • Opcode Fuzzy Hash: 6a9325ad8c8a633399401bdfb21f3ef7d680fdc45c8e2e4627c92b6372fe11e4
                                                                            • Instruction Fuzzy Hash: 3B914571E05229CBEB24DF65C844BDDBBB6BB89300F14C9EAC51AB7254E7715A85CF00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 57d8198c97f6219dc4397ad195ff25c8862eb0dac1fee48c13b3bf32b743253c
                                                                            • Instruction ID: 00e15b4a2b13f06e66b9ec28b9916aea1797ae9d4ae1a3745817fa8bcf22f509
                                                                            • Opcode Fuzzy Hash: 57d8198c97f6219dc4397ad195ff25c8862eb0dac1fee48c13b3bf32b743253c
                                                                            • Instruction Fuzzy Hash: 77912471E00229CFEB64DF65C844BDDBBB6BB89300F14C5EAD509B6254E7709A85CF04
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3c7a375c5b23ab0a44f43a46bc7144668646086f3b1b1c826b6e402650bc5c68
                                                                            • Instruction ID: b7fe33e689ae3094430fee3ddc01c24ba0c48b3eef91ae2bd563e10bb564e3d4
                                                                            • Opcode Fuzzy Hash: 3c7a375c5b23ab0a44f43a46bc7144668646086f3b1b1c826b6e402650bc5c68
                                                                            • Instruction Fuzzy Hash: 9081F374E012099FDB48DFA9D8855EEBFB2FF89300F10946AD816AB354DB749902CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fb6cbc1f6b7a2ad9bd0e84e792d94501f3e0f4a27f8d6fa96c21b1b07b0eeeea
                                                                            • Instruction ID: 7bd41bef15ed3c907a8b45a59dcc7677e8213ae9886ea5dd6f1e7890b274156d
                                                                            • Opcode Fuzzy Hash: fb6cbc1f6b7a2ad9bd0e84e792d94501f3e0f4a27f8d6fa96c21b1b07b0eeeea
                                                                            • Instruction Fuzzy Hash: E881F274E002099FCB48DFA9D8455EEBFB2FF89300F20946AE816AB354DB349902CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 23b1d63a50e45076b09dcf0e967b4ff4590f9bccd9e13b5b1caee6f5f38d8587
                                                                            • Instruction ID: dbe56cd3f4e7247436541f367bd0fdd4fee5335476f09504071fdff887e4792b
                                                                            • Opcode Fuzzy Hash: 23b1d63a50e45076b09dcf0e967b4ff4590f9bccd9e13b5b1caee6f5f38d8587
                                                                            • Instruction Fuzzy Hash: 80811571E0022ACFDB64DF64C984BDDBBB6BB89300F1489EAD509B7244E7749A85CF14
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e642e8baaba314fac30851603622f546a3658963a0db7417e8df8b27ae9e896a
                                                                            • Instruction ID: 843c8d887412518aedb981cf04554af523ce182bfd0e689197857e257013c9a0
                                                                            • Opcode Fuzzy Hash: e642e8baaba314fac30851603622f546a3658963a0db7417e8df8b27ae9e896a
                                                                            • Instruction Fuzzy Hash: 07811571E0122ACFEB24DF64C944BDDB7B6BB89300F1489EAD10AB7244E7759A85CF14
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f2de648a5f29b0153511a95a422fa5a9c2b7327d5e6b889b813e53b38d1e1349
                                                                            • Instruction ID: a1ce7f030aea3688c36955220b41b18060a7413671e9b287d212ed0b81e94bb5
                                                                            • Opcode Fuzzy Hash: f2de648a5f29b0153511a95a422fa5a9c2b7327d5e6b889b813e53b38d1e1349
                                                                            • Instruction Fuzzy Hash: 63715A71D0022ACFDB64DF64C844BDDB7B6BB89300F148AEAD11AB7244E7719A85CF04
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e4ec34337a1463c0512c471623bc9689b1381203d3fd9fdf21465ffba9b011e8
                                                                            • Instruction ID: 933ed05d518ed448d7e39041fb2f6fa98faa9b3a545c8f8a7bb03a15f21044bc
                                                                            • Opcode Fuzzy Hash: e4ec34337a1463c0512c471623bc9689b1381203d3fd9fdf21465ffba9b011e8
                                                                            • Instruction Fuzzy Hash: 24417C70E102189BDB48DFA5D5445DEBBF2FFCA301F14A869E405B7354DB7499028B18
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8fe7d74c71441899ce382a3aa4405f3a7dad31913bc0b415bd918de8bd365aea
                                                                            • Instruction ID: 0b368540204223b2a070b4d540c5fd7dae29b61c57b5687914a3a1a71ef910ac
                                                                            • Opcode Fuzzy Hash: 8fe7d74c71441899ce382a3aa4405f3a7dad31913bc0b415bd918de8bd365aea
                                                                            • Instruction Fuzzy Hash: 6E415930E152189BDB48DFA9D9445DEFBF2FBCE301F14A869E40AB7254DB7598018B18
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 477a830187cc18a321dbb4f0bae6a9f03d729ad62568926a5813e6b72bb3488e
                                                                            • Instruction ID: 39515246f0a78565055b2c1bfa984091f60b0f9ec0e3bd249082d5b1c9198ee5
                                                                            • Opcode Fuzzy Hash: 477a830187cc18a321dbb4f0bae6a9f03d729ad62568926a5813e6b72bb3488e
                                                                            • Instruction Fuzzy Hash: DB112A30D042588FDB14DFA5D818BEEBAF1FB4E312F5494A9D545B72A0CB744984CB78
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0B587346
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CreateProcess
                                                                            • String ID: .%Gt$.%Gt
                                                                            • API String ID: 963392458-2932448424
                                                                            • Opcode ID: 81d791be8c677563a27d29ec4b1fe8cdb6c8e155e7f2e4ae38793366d70ed4ba
                                                                            • Instruction ID: 07b58521544239e5fca08d141c35f153a085b65a3ef0a2486ccb40db91f4c77f
                                                                            • Opcode Fuzzy Hash: 81d791be8c677563a27d29ec4b1fe8cdb6c8e155e7f2e4ae38793366d70ed4ba
                                                                            • Instruction Fuzzy Hash: DD915C71D002198FEF10DFA8C8817EDBBB2BB48314F2585A9E819B7290DB749D85CF91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0B587346
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CreateProcess
                                                                            • String ID: .%Gt$.%Gt
                                                                            • API String ID: 963392458-2932448424
                                                                            • Opcode ID: bab0ef0fb331d7a2912a140c0a917be2ef3a34109e2127797b3328354c424d52
                                                                            • Instruction ID: 5e901c7b7c69b557dc373254d64a90c378dcdfc8fdf61d6d632aa9844f2a7387
                                                                            • Opcode Fuzzy Hash: bab0ef0fb331d7a2912a140c0a917be2ef3a34109e2127797b3328354c424d52
                                                                            • Instruction Fuzzy Hash: 0C914C71D002198FEF14DFA8C881BDDBBB2BB48314F2585A9E819B7250DB749D85CF91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 0B586D6E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: ContextThread
                                                                            • String ID: .%Gt
                                                                            • API String ID: 1591575202-3078615037
                                                                            • Opcode ID: bdcec79e1f79743c7d964e59737e472245a0764fa96c2506c1f92394627f3a76
                                                                            • Instruction ID: 7c9b23fe350cde0faa9e9c2feafaa30966834cd2e84e25f21d551592200e9a20
                                                                            • Opcode Fuzzy Hash: bdcec79e1f79743c7d964e59737e472245a0764fa96c2506c1f92394627f3a76
                                                                            • Instruction Fuzzy Hash: D4319C718003489FDB50DFA9C8947DEBBF0FF48214F15886AD849BB242CB38A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0B586F18
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: MemoryProcessWrite
                                                                            • String ID: .%Gt
                                                                            • API String ID: 3559483778-3078615037
                                                                            • Opcode ID: cc78a3d1c83d1dfb68a7d44cac48d19d5b339fe8cec27992345e61cea2d8b6a0
                                                                            • Instruction ID: a77e1bd00147d67e1c318ea0826c644d17600c9d150fee2c10776538186747f6
                                                                            • Opcode Fuzzy Hash: cc78a3d1c83d1dfb68a7d44cac48d19d5b339fe8cec27992345e61cea2d8b6a0
                                                                            • Instruction Fuzzy Hash: 6A2144B19002499FCF10DFA9C9807EEBBF5FF48314F10842AE918A7240C778A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0B586F18
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: MemoryProcessWrite
                                                                            • String ID: .%Gt
                                                                            • API String ID: 3559483778-3078615037
                                                                            • Opcode ID: 22d722d11a2ac2aa448de6e26aa7accdb2671cb1424f344807e6c2e193d71e7c
                                                                            • Instruction ID: aba62db34f1a3a37dda990b4e7ccfc963f0044bbb8b1ad46152d7c24a1d01dda
                                                                            • Opcode Fuzzy Hash: 22d722d11a2ac2aa448de6e26aa7accdb2671cb1424f344807e6c2e193d71e7c
                                                                            • Instruction Fuzzy Hash: E22113719002599FDF10DFA9C984BEEBBF5FF48314F10842AE919A7240D778A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0B586FF8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: MemoryProcessRead
                                                                            • String ID: .%Gt
                                                                            • API String ID: 1726664587-3078615037
                                                                            • Opcode ID: 228be3d05f82dbd3cdd7847d16851fbc1751c8b7d8c457e8ad13401ecc12b5aa
                                                                            • Instruction ID: 9ca351060d2b59e762d5698441dbf617aa42ff147cef5f2ba681efb8f99f3328
                                                                            • Opcode Fuzzy Hash: 228be3d05f82dbd3cdd7847d16851fbc1751c8b7d8c457e8ad13401ecc12b5aa
                                                                            • Instruction Fuzzy Hash: 262123B19002498FDF10CFA9D9847EEBBF5FF48314F10882AE519B7250D778A904CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0B586FF8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: MemoryProcessRead
                                                                            • String ID: .%Gt
                                                                            • API String ID: 1726664587-3078615037
                                                                            • Opcode ID: 4167fee91799b41d960f6586b5a978129322978c85e51dfa2e158a6164e4779d
                                                                            • Instruction ID: 8f81e3e94e24312fa3e10299e9c281764a2659691da022092af59bef931945f9
                                                                            • Opcode Fuzzy Hash: 4167fee91799b41d960f6586b5a978129322978c85e51dfa2e158a6164e4779d
                                                                            • Instruction Fuzzy Hash: 3E2116719002599FDF10DFAAC8806EEBBF5FF48314F10842AE519A7240D778A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 0B586D6E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: ContextThread
                                                                            • String ID: .%Gt
                                                                            • API String ID: 1591575202-3078615037
                                                                            • Opcode ID: 0040ed41fe6c8e47cdd1c5e2c010655d0548b398bc22bb5e910d505087e5abad
                                                                            • Instruction ID: a2044949c1b32fa10fec60e7d3340173526593f0a6a7d0dae10f8a19ec50193f
                                                                            • Opcode Fuzzy Hash: 0040ed41fe6c8e47cdd1c5e2c010655d0548b398bc22bb5e910d505087e5abad
                                                                            • Instruction Fuzzy Hash: 45211571D002498FDB50DFAAC4847EEBBF5EF48264F14842AD859B7240DB78A945CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0B586E36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID: .%Gt
                                                                            • API String ID: 4275171209-3078615037
                                                                            • Opcode ID: 769bb0a5fca0bf479f2ec11ce9766af03414c0a4c0e4b6154717964d9ee65793
                                                                            • Instruction ID: ef4363ee1a80332bffa687c66d291e870c7c56b6aca04db1c924b4cc580d01a5
                                                                            • Opcode Fuzzy Hash: 769bb0a5fca0bf479f2ec11ce9766af03414c0a4c0e4b6154717964d9ee65793
                                                                            • Instruction Fuzzy Hash: 111144769002489BDF20DFAAD9447EFBBF5EF48324F14881AE519B7250C739A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0B58282B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID: .%Gt
                                                                            • API String ID: 544645111-3078615037
                                                                            • Opcode ID: 610cdb54416672bfbd04e7d5441681bf77e4d138b53e2d75bf37672c3888f663
                                                                            • Instruction ID: b120a99e0c0f9901e6b739ac377450e5de58581a428ba67af554689090716add
                                                                            • Opcode Fuzzy Hash: 610cdb54416672bfbd04e7d5441681bf77e4d138b53e2d75bf37672c3888f663
                                                                            • Instruction Fuzzy Hash: 422122B59002098FCB10CF9AD984BDEBBF4FF48320F10842AE459A7240D378A644CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0B58282B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID: .%Gt
                                                                            • API String ID: 544645111-3078615037
                                                                            • Opcode ID: e5f2df8d150c7a2adb90f02cc5a1dbb3919015ce0f8af5956034de4a77aff765
                                                                            • Instruction ID: 4ef9a7f5dc7e1721c39b998299a324a4a7e5ed78c30e668e2391d11ee331e481
                                                                            • Opcode Fuzzy Hash: e5f2df8d150c7a2adb90f02cc5a1dbb3919015ce0f8af5956034de4a77aff765
                                                                            • Instruction Fuzzy Hash: CC2106B19002499FDB10CF9AD484BDEBBF4FB48320F108429E458A7250D378A544CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0B586E36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID: .%Gt
                                                                            • API String ID: 4275171209-3078615037
                                                                            • Opcode ID: 976be1fee17b78c62361d54da9fe121253f8f834301c3b5d4c0a4138b6ad3c96
                                                                            • Instruction ID: fc7dd6c0adc58c2f07b503de894afa968e006804fd257ea81dccfbd3a1e0f1e4
                                                                            • Opcode Fuzzy Hash: 976be1fee17b78c62361d54da9fe121253f8f834301c3b5d4c0a4138b6ad3c96
                                                                            • Instruction Fuzzy Hash: 1B1126719002489BDF10DFAAD8447DFBBF5AF48324F148819E515A7250C775A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID: .%Gt
                                                                            • API String ID: 947044025-3078615037
                                                                            • Opcode ID: 1d261c7a17f521bb4c514d77279e07ddb905857dc25099ca54719c10aad6df77
                                                                            • Instruction ID: 4a4163eb6a37441ab1ac780985d0909caca13349bc329855a9b451f91b3374ad
                                                                            • Opcode Fuzzy Hash: 1d261c7a17f521bb4c514d77279e07ddb905857dc25099ca54719c10aad6df77
                                                                            • Instruction Fuzzy Hash: 631128B1D002488BDB10DFAAD4447EEBBF5AF88228F15845ED419B7240CB74A945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID: .%Gt
                                                                            • API String ID: 947044025-3078615037
                                                                            • Opcode ID: 60930d7685153a4d47cd087da7d01946e0c4cd4b7c1818d6c03b0e4e6027c9d0
                                                                            • Instruction ID: cbdf5729dd502efba1e4ee86660d2ab9524a2988b0269858dc566786adc8982f
                                                                            • Opcode Fuzzy Hash: 60930d7685153a4d47cd087da7d01946e0c4cd4b7c1818d6c03b0e4e6027c9d0
                                                                            • Instruction Fuzzy Hash: 121128B1D002488BDB10DFAAD4447DEBBF5AF88224F148419D419B7240CB74A945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • PostMessageW.USER32(?,?,?,?), ref: 0B58C245
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID: MessagePost
                                                                            • String ID: .%Gt
                                                                            • API String ID: 410705778-3078615037
                                                                            • Opcode ID: d5a6fe0e35c0ec0084d6b5e78cbf8051bdf0c6a0211778a44e2f0432f7a24003
                                                                            • Instruction ID: 5ba410391a85100086cf6f64e1ce76a82a5e8c54808f05b2667ea6c5f22dde2d
                                                                            • Opcode Fuzzy Hash: d5a6fe0e35c0ec0084d6b5e78cbf8051bdf0c6a0211778a44e2f0432f7a24003
                                                                            • Instruction Fuzzy Hash: C11112B58003489FDB10DF9AD884BDEBBF8FB48324F10845AE555B7640C374A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Non-executed Functions

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: z#W$+W
                                                                            • API String ID: 0-1723955444
                                                                            • Opcode ID: a25b60c2f28c207812b3a2a2b04a4d565bc3f6248984f4b3fbb457943450ab5a
                                                                            • Instruction ID: fe6d460caaadb926722279f69b099d8f6f4bda0654ba6007cebc037c58fb1919
                                                                            • Opcode Fuzzy Hash: a25b60c2f28c207812b3a2a2b04a4d565bc3f6248984f4b3fbb457943450ab5a
                                                                            • Instruction Fuzzy Hash: FF91E174E052099FDB09DFE9D9815EEFBF2BB89300F20A4AAE415BB214D7309A01CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: z#W$+W
                                                                            • API String ID: 0-1723955444
                                                                            • Opcode ID: 2afe722d61b7cae12e6b7faa49880790c7fd56b8cc9fc7b13c08eef4dafdbc99
                                                                            • Instruction ID: 0de9ef53049224214e309835aa4e4d77544d69fbc3dc4843f9a1cdc5fdeef237
                                                                            • Opcode Fuzzy Hash: 2afe722d61b7cae12e6b7faa49880790c7fd56b8cc9fc7b13c08eef4dafdbc99
                                                                            • Instruction Fuzzy Hash: 2891D274E052499FDB09DFE9D9815EEFBF2BB89300F20A4AAE415BB254D7309A01CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: nev
                                                                            • API String ID: 0-3371871415
                                                                            • Opcode ID: e974625fef75afb2d0e91d56047418f7dc1d279ebca57a361fb4a386a1d8803b
                                                                            • Instruction ID: 996e8743225819a6ab841a0b8b72f853c9a1010b1dc9e67963d8959444da149e
                                                                            • Opcode Fuzzy Hash: e974625fef75afb2d0e91d56047418f7dc1d279ebca57a361fb4a386a1d8803b
                                                                            • Instruction Fuzzy Hash: 0F616770E0520ACBDB05DFE9C4416AFBBF2BB88310F14C4A6D814BB354E7349A418FA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: nev
                                                                            • API String ID: 0-3371871415
                                                                            • Opcode ID: c1aa282fe9123e6a87771e42e5b2ff6790f98e56a1a5abfe895302ffdffa0b89
                                                                            • Instruction ID: 1a751e1cda9e00b893c966b712e9d0a87b1746bc7b46a9ca7dbd1ed494bb1510
                                                                            • Opcode Fuzzy Hash: c1aa282fe9123e6a87771e42e5b2ff6790f98e56a1a5abfe895302ffdffa0b89
                                                                            • Instruction Fuzzy Hash: D0614570E0520ACBDB04DFA9C485AAFFBF2BB88310F14D866D814BB354D7349A418FA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: X^ql
                                                                            • API String ID: 0-1006607919
                                                                            • Opcode ID: ab7ce62d528b44acc3727194161dc1b3cb7dda009ea39e5d182c3e95e94b7ff7
                                                                            • Instruction ID: 29344e9c628310fc072a71a074b610efbbdf2608f723c62b8a4dfc6eb9f70d23
                                                                            • Opcode Fuzzy Hash: ab7ce62d528b44acc3727194161dc1b3cb7dda009ea39e5d182c3e95e94b7ff7
                                                                            • Instruction Fuzzy Hash: 1F614974E011299FDB14DFA9C980A9EFBF7BB89204F14C5A9D808BB345D7309A85CF60
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: X^ql
                                                                            • API String ID: 0-1006607919
                                                                            • Opcode ID: 3cb1ec29c136b3c1caa35a6d86796d2cee43b35303c4a7e0a1ec643e43a49aed
                                                                            • Instruction ID: 34e024bb96dd535720f2b48c120a27341045b617c475c3f128297a0ae190c7db
                                                                            • Opcode Fuzzy Hash: 3cb1ec29c136b3c1caa35a6d86796d2cee43b35303c4a7e0a1ec643e43a49aed
                                                                            • Instruction Fuzzy Hash: 74613A74E011199FDB14DFA9C980A9EFBF7BB89204F14C5A9D808BB355D7309985CF60
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .%Gt
                                                                            • API String ID: 0-3078615037
                                                                            • Opcode ID: ff0c97017bd196560b73a9be2cf92c83633862046e04da5daa5ae02fd2418d53
                                                                            • Instruction ID: 13628c8922578d35bbf0d329d04464e2a14082447935d428eb750ab00d09d5c9
                                                                            • Opcode Fuzzy Hash: ff0c97017bd196560b73a9be2cf92c83633862046e04da5daa5ae02fd2418d53
                                                                            • Instruction Fuzzy Hash: C951ACB1D056588FDB59CF6B8D5468AFBF3AFC9200F18C0EAC44CAB265EB341A458F11
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .%Gt
                                                                            • API String ID: 0-3078615037
                                                                            • Opcode ID: 871565869cec75e547bcf5963bfb3d55c9e080c56fb655d6d9a1292082184742
                                                                            • Instruction ID: 639d2e842877a8b2bd733bdbcb21a6c07a0c87bd89bd2ac86b98efbf0fa3a21f
                                                                            • Opcode Fuzzy Hash: 871565869cec75e547bcf5963bfb3d55c9e080c56fb655d6d9a1292082184742
                                                                            • Instruction Fuzzy Hash: 20514AB1E016188BDB68DF6B8D4569EFBF7BFC8300F14C1BA950CA6254DB301A858F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.340014659.0000000000802000.00000002.00020000.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000000.00000002.340008897.0000000000800000.00000002.00020000.sdmp Download File
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d234e09036e31faa7c15afc53c8ce32842f786e3c44d0486ba8d94246aa65fac
                                                                            • Instruction ID: 0978b9dbf832ea9b7126a7a98adfa81f958690f07ca4a2a3de72fc7ac17737c1
                                                                            • Opcode Fuzzy Hash: d234e09036e31faa7c15afc53c8ce32842f786e3c44d0486ba8d94246aa65fac
                                                                            • Instruction Fuzzy Hash: 7461995684F3C25FC3438B348C65692BFB59E1312471E49EBC8C5CE4A3E1485A5EDB63
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c45d911e49f9429198eb41aff806b75d613fa02e98a604524496d292d35289b6
                                                                            • Instruction ID: b393c82ca9ad1a98ee85d5aec00f517e66a99c63bbe1a5362f8cef5b09f4c006
                                                                            • Opcode Fuzzy Hash: c45d911e49f9429198eb41aff806b75d613fa02e98a604524496d292d35289b6
                                                                            • Instruction Fuzzy Hash: 6E712B74E052199FDB14DFA9D980AAEFBF2BF88204F24C5AAD408B7315E7309A45CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6c672cba29db3021cf0948d88415857e23ae90eb497fb4b7972f7b28c15f9f7a
                                                                            • Instruction ID: 94dd67e54bdfcfd5bf676f0554f4eb43eb51067e1dfaf2b834196b1093e0c3ce
                                                                            • Opcode Fuzzy Hash: 6c672cba29db3021cf0948d88415857e23ae90eb497fb4b7972f7b28c15f9f7a
                                                                            • Instruction Fuzzy Hash: 6D613B74E052199FDB14DFA9D980AAEFBF3BF88204F24C5AAD408A7315E7309A45CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5485f033172e3d543a8df69d93c5f35f32b47f263f9f46bc3d526fa5ececf81c
                                                                            • Instruction ID: 10e0833d52d2b650502de3c5474462457baf07c8d13b7ddf673a23cb0e39a4ff
                                                                            • Opcode Fuzzy Hash: 5485f033172e3d543a8df69d93c5f35f32b47f263f9f46bc3d526fa5ececf81c
                                                                            • Instruction Fuzzy Hash: 0A516F74E001299FDB14DF9AD9806AEFBF7BB89604F24C5AAD818B7345DB305A41CF60
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e12b2d12eeb605e77823dab5e6eca589e6d6211e7573a97fedb6fbea3570cd64
                                                                            • Instruction ID: 53f02344cb518260f6a57a6dbeef4c492f76bef684455485828177e6e5379240
                                                                            • Opcode Fuzzy Hash: e12b2d12eeb605e77823dab5e6eca589e6d6211e7573a97fedb6fbea3570cd64
                                                                            • Instruction Fuzzy Hash: FD516F74E0511A9FDB14DFAAC9806AEFBF7BB89204F24C1AAD808B7345D7305A45CF61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4234d5fb139fe191d96523823258f76b2d29b76f4d1db00c043bd77552f5575b
                                                                            • Instruction ID: e9194441bd4840e9c679ba2c643eb6d02585e96ffc01b04ca2927b7ca7f614fd
                                                                            • Opcode Fuzzy Hash: 4234d5fb139fe191d96523823258f76b2d29b76f4d1db00c043bd77552f5575b
                                                                            • Instruction Fuzzy Hash: 34510570E112188FDB54CF69D884B9EBBB6BF89210F14C0A9D509AB364DB309E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.346734270.000000000B580000.00000040.00000001.sdmp, Offset: 0B580000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2abd5798667375a1b510558d089e6c9ee4d4d56c4313513c36cb13d5d0405c7c
                                                                            • Instruction ID: 5f39b58bd7abc434b67004dad66fd3d16666eb401d52832fac09fe8f47ca3ba1
                                                                            • Opcode Fuzzy Hash: 2abd5798667375a1b510558d089e6c9ee4d4d56c4313513c36cb13d5d0405c7c
                                                                            • Instruction Fuzzy Hash: 45512670E102189FDB54CF69D885B9EBBF2BF89200F14C0AAD909AB365DB309E41CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Executed Functions

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.599148125.0000000006190000.00000040.00000001.sdmp, Offset: 06190000, based on PE: false
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 624f8f83ab0bed1db49154583be55dfdcab9fa3a003b79232831831057535602
                                                                            • Instruction ID: d4f6a5be8208a4270a1a46c4024564e01baa0600e714fa8514e6c97be84c5044
                                                                            • Opcode Fuzzy Hash: 624f8f83ab0bed1db49154583be55dfdcab9fa3a003b79232831831057535602
                                                                            • Instruction Fuzzy Hash: 09F14A30E00209CFDB55DFA9C994BADBBF2BF84314F158568E409AB265DB70A945CBA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05D0B62B
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID:
                                                                            • API String ID: 2645101109-0
                                                                            • Opcode ID: a9dec50da9bda9657e15cff9a6cd518371a018d66270c25d178b36cb3a00d1e4
                                                                            • Instruction ID: 4b783c2a2ede25f97e0e821fb8df797b99e57107f1e4dda40a9f0b5f11cd6196
                                                                            • Opcode Fuzzy Hash: a9dec50da9bda9657e15cff9a6cd518371a018d66270c25d178b36cb3a00d1e4
                                                                            • Instruction Fuzzy Hash: 3B510370D042188FEB14CFA9C899BDEBBB1BF48314F15816AE856BB390DB749844CF95
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32 ref: 029169A0
                                                                            • GetCurrentThread.KERNEL32 ref: 029169DD
                                                                            • GetCurrentProcess.KERNEL32 ref: 02916A1A
                                                                            • GetCurrentThreadId.KERNEL32 ref: 02916A73
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: Current$ProcessThread
                                                                            • String ID: `
                                                                            • API String ID: 2063062207-4168407445
                                                                            • Opcode ID: d40791ab401cae25f1594921ddca2aacb8867f9f3ebb2d7491ca96d4b09595ed
                                                                            • Instruction ID: 9562737aa16d25b524bf4aeca6ea86989d58c70388be8ae03e35a24583fdd2e4
                                                                            • Opcode Fuzzy Hash: d40791ab401cae25f1594921ddca2aacb8867f9f3ebb2d7491ca96d4b09595ed
                                                                            • Instruction Fuzzy Hash: 315146B0E007488FDB54CFAAD648B9EBBF5EF88318F248599E409A7350D7345884CF65
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05D0B62B
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID:
                                                                            • API String ID: 2645101109-0
                                                                            • Opcode ID: 3ecfe748de4b1538575f25c3778ff7f7ad2e679fac0df259fc69141136bfd1ef
                                                                            • Instruction ID: 2b1571bd5bfb090074ef51c98695e4e8f95341d3f286b16d547bdca77262796e
                                                                            • Opcode Fuzzy Hash: 3ecfe748de4b1538575f25c3778ff7f7ad2e679fac0df259fc69141136bfd1ef
                                                                            • Instruction Fuzzy Hash: 58513470E042188FEB14CFA9C895BEDBBB2BF48314F15816AD815BB790DB749844CF90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05D0B62B
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID:
                                                                            • API String ID: 2645101109-0
                                                                            • Opcode ID: b423ed1eb685584649017b72bd954f447319dfd35a6b83b16b9a901520a507b4
                                                                            • Instruction ID: 3f994e2cf0e19f64c14d30c4325a2730dbf8f1bb553527702018efa06157a26d
                                                                            • Opcode Fuzzy Hash: b423ed1eb685584649017b72bd954f447319dfd35a6b83b16b9a901520a507b4
                                                                            • Instruction Fuzzy Hash: E5510270D042188FEB14CFA9C899BEDBBB1BF48314F15816AE856BB390DB749844CF94
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 029151A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CreateWindow
                                                                            • String ID:
                                                                            • API String ID: 716092398-0
                                                                            • Opcode ID: 03bc21718aa0ac3afce0f631101ccee355d082f9aa6e2be8414e545675c356fd
                                                                            • Instruction ID: ce319976d6a6c021b63e734dae184c61fcb1f71b071c6265419e5154a0cc428b
                                                                            • Opcode Fuzzy Hash: 03bc21718aa0ac3afce0f631101ccee355d082f9aa6e2be8414e545675c356fd
                                                                            • Instruction Fuzzy Hash: 5051E0B1D003489FDF15CFAAC880ADEBBB5FF88314F65812AE819AB210D7749845CF90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 029151A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CreateWindow
                                                                            • String ID:
                                                                            • API String ID: 716092398-0
                                                                            • Opcode ID: f2370e33e8669c32873b54b209b2e326e5c226c986a9a8f73afb6e2660a6d245
                                                                            • Instruction ID: 29b1cafb903e29a4b8fd41d592a9e05960e209d893c595e98c9e1bb2fc90b40f
                                                                            • Opcode Fuzzy Hash: f2370e33e8669c32873b54b209b2e326e5c226c986a9a8f73afb6e2660a6d245
                                                                            • Instruction Fuzzy Hash: 2141CFB1D003489FDF15CF9AC984ADEBBB5FF88314F65812AE819AB210D7749985CF90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 02917F09
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CallProcWindow
                                                                            • String ID:
                                                                            • API String ID: 2714655100-0
                                                                            • Opcode ID: e2d9b66e419ef5d1aef5813a0632ee10fb98a2a90feef13db27fb9a8780e728e
                                                                            • Instruction ID: 7d099ba101c54abd96c1953679d9b46f0059ebe380da362fa3bd5f822ddeab79
                                                                            • Opcode Fuzzy Hash: e2d9b66e419ef5d1aef5813a0632ee10fb98a2a90feef13db27fb9a8780e728e
                                                                            • Instruction Fuzzy Hash: 3B412BB5A003498FCB14CF99C488AABFBF5FF88314F158599E519AB321D734A841CFA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: Clipboard
                                                                            • String ID:
                                                                            • API String ID: 220874293-0
                                                                            • Opcode ID: 23f12802d15ee24d5933dafab5fa9bbefd4a8af4d669d44b5eda0bf3dcb48b21
                                                                            • Instruction ID: 2c6958797a18e4b355c8b30e911a55fd1857df1ddd1127a2521d7847887ffdc2
                                                                            • Opcode Fuzzy Hash: 23f12802d15ee24d5933dafab5fa9bbefd4a8af4d669d44b5eda0bf3dcb48b21
                                                                            • Instruction Fuzzy Hash: 833102B0D112089FDB10DF99C984BDEFBF5AF48304F24815AE405BB3A0D7B4A849CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: Clipboard
                                                                            • String ID:
                                                                            • API String ID: 220874293-0
                                                                            • Opcode ID: 256ff5f3cb78708424c1222183ce2d9c89e262b593d113918d25618705ff1432
                                                                            • Instruction ID: aea6c4d77fb0d8966c53c8d02853256f928d15a67aecb4cfa0a755be05fd093d
                                                                            • Opcode Fuzzy Hash: 256ff5f3cb78708424c1222183ce2d9c89e262b593d113918d25618705ff1432
                                                                            • Instruction Fuzzy Hash: 783102B0D01208DFDB10CF99C984BDEBBF1AF48308F24805AE405BB7A0D7749849CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02916BEF
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: 0f1068fd906c5a47e1daf40a8759072c3526d10b9f7dcb2d4631889491eedf0e
                                                                            • Instruction ID: 2d4740d7e6e6fc63ac4a647589162c0edba4f807c57c8bd49c49901b1784fa48
                                                                            • Opcode Fuzzy Hash: 0f1068fd906c5a47e1daf40a8759072c3526d10b9f7dcb2d4631889491eedf0e
                                                                            • Instruction Fuzzy Hash: 6C2112B5D002589FDB10CFA9D984AEEBFF8EF48324F15805AE954A7310D338A944CFA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02916BEF
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: 8d770eacfd109738c6cca7b3a3542683053ea75b4b13db16575a493e2e1e49de
                                                                            • Instruction ID: 8fd42e8e2563a07e7f54cab6585111930e9a6c03f2e3e0eb2c57bfc9282d48bc
                                                                            • Opcode Fuzzy Hash: 8d770eacfd109738c6cca7b3a3542683053ea75b4b13db16575a493e2e1e49de
                                                                            • Instruction Fuzzy Hash: 0B21F3B5D002489FDB10CFAAD984ADEBBF8FF48324F15845AE914A3310D378A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,00000000,?,06191A79,00000800), ref: 06191B0A
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.599148125.0000000006190000.00000040.00000001.sdmp, Offset: 06190000, based on PE: false
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 62e3ab5fcaa0fa7e2d06c116af4ff7f924e8c0b73e08a301778649ffbedb6982
                                                                            • Instruction ID: 035fdf2d40a12978023da41235e32595186dd412e4eef982bd03cfdc46ad41ef
                                                                            • Opcode Fuzzy Hash: 62e3ab5fcaa0fa7e2d06c116af4ff7f924e8c0b73e08a301778649ffbedb6982
                                                                            • Instruction Fuzzy Hash: DB1100B6D002499FCB10CF9AC444ADEBBF5EB88324F15842AE919A7610C774A949CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 0291C222
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: EncodePointer
                                                                            • String ID:
                                                                            • API String ID: 2118026453-0
                                                                            • Opcode ID: 0af247453fab7099cb09245dbb04508253eb58b1c2a119e3569db33ab3b6314c
                                                                            • Instruction ID: e0ef529084b4c88d278370b91c470e68f04be3ac59a5ec136da47e69535121ac
                                                                            • Opcode Fuzzy Hash: 0af247453fab7099cb09245dbb04508253eb58b1c2a119e3569db33ab3b6314c
                                                                            • Instruction Fuzzy Hash: 4611ACB1A443088FDB10DFAAD90879EBBF4FB48714F20882AD804B3610C738A448CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 02914116
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: d86640b19bc2cfd2e485a92e5b189d3f40e563e0ceeed643104797b8773f3b12
                                                                            • Instruction ID: 07bff35861a32e4aa6673f6372e1342ffe7f3f56f07e82ada01884222a44467c
                                                                            • Opcode Fuzzy Hash: d86640b19bc2cfd2e485a92e5b189d3f40e563e0ceeed643104797b8773f3b12
                                                                            • Instruction Fuzzy Hash: CB1132B6D002598FCB10CF9AC444ADEFBF4EF89324F15806AD459B7610D378A545CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 02914116
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.594347897.0000000002910000.00000040.00000001.sdmp, Offset: 02910000, based on PE: false
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: 933c24c271e8171618ba5762e6fda58f1c8505e278dc1d4a77795b4892bc9c24
                                                                            • Instruction ID: 21270348019f872feaeec824a64a7e9e54c2aa1c366d59077672e3f91ac6733f
                                                                            • Opcode Fuzzy Hash: 933c24c271e8171618ba5762e6fda58f1c8505e278dc1d4a77795b4892bc9c24
                                                                            • Instruction Fuzzy Hash: 8C1120B5D002498BCB10CF9AC444BDEBBF4EB88324F11842AD829B7200C378A545CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,05D0C117), ref: 05D0C1A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: c399a9886edcf9f90363992fa0cfc156bf5490a073e398d5ce0617864e40c489
                                                                            • Instruction ID: 888cfb45045b21562b3ddae62b20bc747ff1308871afa9fdd9abb50e3c16307c
                                                                            • Opcode Fuzzy Hash: c399a9886edcf9f90363992fa0cfc156bf5490a073e398d5ce0617864e40c489
                                                                            • Instruction Fuzzy Hash: 3C1122B19042498FCB10DF9AD844BDEFBF8EB88324F24845AD519A7350C774A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,05D0C117), ref: 05D0C1A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 8eba5cbd6021123b77aea1f3bc248dd6682a5634a78bd5a173f2557949c61ab8
                                                                            • Instruction ID: 65ab7c552318470ef8dbbb005300cfbb31edb0e068fec325cd7422527211047f
                                                                            • Opcode Fuzzy Hash: 8eba5cbd6021123b77aea1f3bc248dd6682a5634a78bd5a173f2557949c61ab8
                                                                            • Instruction Fuzzy Hash: 2E11F2B19002598FDB10DF9AD884BDEFBF8EF88324F25845AD519A7350C774A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • OleInitialize.OLE32(00000000), ref: 05D0CD25
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: Initialize
                                                                            • String ID:
                                                                            • API String ID: 2538663250-0
                                                                            • Opcode ID: d6891c495a4063784d0f996d6c5e09e1531d7464ad0d02d7fd6aa7c817ae1c0d
                                                                            • Instruction ID: 292ad0efc6f3fa86fa70b1e45022540b4de21521f8a19a35acadba97a06bc467
                                                                            • Opcode Fuzzy Hash: d6891c495a4063784d0f996d6c5e09e1531d7464ad0d02d7fd6aa7c817ae1c0d
                                                                            • Instruction Fuzzy Hash: 9C1130B09002488FCB20CF9AD448BDEFBF4EB48224F10855AE519A7710C378A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • OleInitialize.OLE32(00000000), ref: 05D0CD25
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.598866484.0000000005D00000.00000040.00000001.sdmp, Offset: 05D00000, based on PE: false
                                                                            Similarity
                                                                            • API ID: Initialize
                                                                            • String ID:
                                                                            • API String ID: 2538663250-0
                                                                            • Opcode ID: 80556929d0403a53739aae6e0145b9f54f3ae43b3a9d0032c8068a211010d3e3
                                                                            • Instruction ID: 40ad4eecf9796c97bee03b319a98667d2ab9b8e274babbb7cd7b470431c0c485
                                                                            • Opcode Fuzzy Hash: 80556929d0403a53739aae6e0145b9f54f3ae43b3a9d0032c8068a211010d3e3
                                                                            • Instruction Fuzzy Hash: CD1123B19002488FCB10DF99D485BCEFFF8EB48324F15855AD519A7710C378A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Non-executed Functions