Loading ...

Play interactive tourEdit tour

Analysis Report HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe

Overview

General Information

Sample Name:HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
Analysis ID:433036
MD5:14f4f4356a708f1e9e18c6c71ef3153e
SHA1:a04edf6cb2d97539a509d17411a5884f75d5e5cf
SHA256:0a27c51c891f44c26d8db8848822880a8209830faf2d8c00e8729151ae76be4f
Tags:exegeoHalkbankTUR
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "service@bmrtecpack.comABdiamond6_mail.bmrtecpack.commozsahim67@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "service@bmrtecpack.comABdiamond6_mail.bmrtecpack.commozsahim67@gmail.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeReversingLabs: Detection: 23%
                      Machine Learning detection for sampleShow sources
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeJoe Sandbox ML: detected
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: Consistency.pdb source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: Binary string: Consistency.pdbH source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_04531298
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_045329B0
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_045329B8
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_04531288
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 184.95.37.27:587
                      Source: Joe Sandbox ViewIP Address: 184.95.37.27 184.95.37.27
                      Source: Joe Sandbox ViewASN Name: SSASN2US SSASN2US
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 184.95.37.27:587
                      Source: unknownDNS traffic detected: queries for: mail.bmrtecpack.com
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://bmrtecpack.com
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpString found in binary or memory: http://ePfJSq.com
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://mail.bmrtecpack.com
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0B
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000003.423100074.0000000000BC4000.00000004.00000001.sdmpString found in binary or memory: https://9YHNdCcoTaUn.org
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219282495.000000000093B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bCCE3BAC3u002d7DB4u002d40C1u002dA125u002d99E23B635274u007d/C57E4028u002d19CEu002d45FCu002d9542u002d6369A7E1B671.csLarge array initialization: .cctor: array initializer size 11977
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_00B6B5AC0_2_00B6B5AC
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_00B6E4700_2_00B6E470
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_00B6CA2B0_2_00B6CA2B
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_00B6B1E00_2_00B6B1E0
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_00B6B5A00_2_00B6B5A0
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_0453067A0_2_0453067A
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_045300D00_2_045300D0
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_045307D70_2_045307D7
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_011751143_2_01175114
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_011708983_2_01170898
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_011785483_2_01178548
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_011700403_2_01170040
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_0117E8903_2_0117E890
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_01172A583_2_01172A58
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_01172AB83_2_01172AB8
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_0123B9083_2_0123B908
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_01236C4C3_2_01236C4C
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_012400623_2_01240062
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_0124B0F03_2_0124B0F0
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_012497B83_2_012497B8
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_01245E483_2_01245E48
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_0124CF103_2_0124CF10
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_012472403_2_01247240
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamenXOvOrEbczSOMbuQKuxXmuqDbcrtLzJGuFczuTT.exe4 vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.220856658.00000000036AF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000000.208995346.000000000022E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConsistency.exe< vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219282495.000000000093B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKygo.dll* vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000002.00000000.215986662.000000000031E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConsistency.exe< vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.477347413.0000000000AAE000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConsistency.exe< vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.479540519.00000000011A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.479505881.0000000001190000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.477581620.0000000000EF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamenXOvOrEbczSOMbuQKuxXmuqDbcrtLzJGuFczuTT.exe4 vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.479981873.0000000001250000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeBinary or memory string: OriginalFilenameConsistency.exe< vs HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.150000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.150000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.9d0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.9d0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@2/1
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeMutant created: \Sessions\1\BaseNamedObjects\EEyHzFbTamTqJQq
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeReversingLabs: Detection: 23%
                      Source: unknownProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe 'C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe'
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: Consistency.pdb source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                      Source: Binary string: Consistency.pdbH source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe

                      Data Obfuscation:

                      barindex
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.150000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 2.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 2.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.9d0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_00B6EC68 pushad ; ret 0_2_00B6EC69
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 0_2_04532B70 pushad ; ret 0_2_04532B71
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85752472578
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'OvQg6h', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.150000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'OvQg6h', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 2.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'OvQg6h', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 2.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.240000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'OvQg6h', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.9d0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'OvQg6h', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe PID: 2600, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWindow / User API: threadDelayed 2445Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWindow / User API: threadDelayed 7411Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe TID: 5676Thread sleep time: -104116s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe TID: 4180Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe TID: 3468Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe TID: 2172Thread sleep count: 2445 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe TID: 2172Thread sleep count: 7411 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeThread delayed: delay time: 104116Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeBinary or memory string: QEMUP
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.479214809.0000000001110000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeCode function: 3_2_01170898 LdrInitializeThunk,3_2_01170898
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeProcess created: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeJump to behavior
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.480682935.00000000019A0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.480682935.00000000019A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.480682935.00000000019A0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.480682935.00000000019A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe PID: 2600, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe PID: 3508, type: MEMORY
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe PID: 3508, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe PID: 2600, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe PID: 3508, type: MEMORY
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.35f2748.1.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection12Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture1Security Software Discovery211Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Credentials in Registry1Process Discovery2SMB/Windows Admin SharesArchive Collected Data11Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelData from Local System2Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe24%ReversingLabsWin32.Trojan.AgentTesla
                      HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.2.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      3.0.HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      bmrtecpack.com1%VirustotalBrowse
                      mail.bmrtecpack.com3%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      https://9YHNdCcoTaUn.org0%Avira URL Cloudsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://r3.i.lencr.org/0B0%Avira URL Cloudsafe
                      http://mail.bmrtecpack.com0%Avira URL Cloudsafe
                      http://ePfJSq.com0%Avira URL Cloudsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://bmrtecpack.com0%Avira URL Cloudsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bmrtecpack.com
                      184.95.37.27
                      truetrueunknown
                      mail.bmrtecpack.com
                      unknown
                      unknowntrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://cps.letsencrypt.org0HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://x1.c.lencr.org/0HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://9YHNdCcoTaUn.orgHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000003.423100074.0000000000BC4000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.o.lencr.org0HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.org%GETMozilla/5.0HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      low
                      http://r3.i.lencr.org/0BHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://mail.bmrtecpack.comHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ePfJSq.comHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpfalse
                        high
                        https://api.ipify.org%HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmpfalse
                          high
                          http://bmrtecpack.comHALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://cps.root-x1.letsencrypt.org0HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe, 00000003.00000002.484187088.0000000003334000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          184.95.37.27
                          bmrtecpack.comUnited States
                          20454SSASN2UStrue

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:433036
                          Start date:11.06.2021
                          Start time:08:03:26
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 2s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:24
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@5/1@2/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 2% (good quality ratio 1%)
                          • Quality average: 39.2%
                          • Quality standard deviation: 41.8%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 51
                          • Number of non-executed functions: 4
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                          • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 104.43.139.144, 23.218.208.56, 20.50.102.62, 2.20.142.210, 2.20.142.209, 20.54.26.129, 20.82.210.154, 92.122.213.194, 92.122.213.247
                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          08:04:19API Interceptor832x Sleep call for process: HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          184.95.37.27PO210530_332641.docGet hashmaliciousBrowse
                            #U4e2d#U56fd#U6d77#U5173#U65b0#U89c4(chinese version).exeGet hashmaliciousBrowse
                              new.exeGet hashmaliciousBrowse
                                c1.exeGet hashmaliciousBrowse
                                  NEW_CV.dox.x.exeGet hashmaliciousBrowse
                                    PO210530_332641-pdf.gz.exeGet hashmaliciousBrowse
                                      qoute_pdf.exeGet hashmaliciousBrowse
                                        Krediler_Odeme_Plani_20210526_171707048.exeGet hashmaliciousBrowse
                                          PO879654433.PDF.exeGet hashmaliciousBrowse
                                            Payment_Advice_05-24-2021_pdf.exeGet hashmaliciousBrowse
                                              3hATtmBa3Q.exeGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                SSASN2USPO210530_332641.docGet hashmaliciousBrowse
                                                • 184.95.37.27
                                                HRnyUiNliV.exeGet hashmaliciousBrowse
                                                • 184.95.51.175
                                                #U4e2d#U56fd#U6d77#U5173#U65b0#U89c4(chinese version).exeGet hashmaliciousBrowse
                                                • 184.95.37.27
                                                Hd1mBP2yIQ.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                new.exeGet hashmaliciousBrowse
                                                • 184.95.37.27
                                                c1.exeGet hashmaliciousBrowse
                                                • 184.95.37.27
                                                dE1IuYMv2a.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                NEW_CV.dox.x.exeGet hashmaliciousBrowse
                                                • 184.95.37.27
                                                N05mKfkULx.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                FLkiItoJYT.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                TdiFSP890W.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                XLbV2SrTfv.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                9l2fgn5tTv.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                SecuriteInfo.com.Variant.Bulz.383129.23206.exeGet hashmaliciousBrowse
                                                • 108.170.22.198
                                                SecuriteInfo.com.Variant.Bulz.383129.29566.exeGet hashmaliciousBrowse
                                                • 108.170.22.198
                                                Icb8VZwQqM.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                nkedbLsEM6.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                Fv5dq78YGC.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                aUAryqmVWH.exeGet hashmaliciousBrowse
                                                • 184.95.51.183
                                                dEalVCTox2.exeGet hashmaliciousBrowse
                                                • 184.95.51.183

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe.log
                                                Process:C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1314
                                                Entropy (8bit):5.350128552078965
                                                Encrypted:false
                                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.509397955171368
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                File name:HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                File size:951296
                                                MD5:14f4f4356a708f1e9e18c6c71ef3153e
                                                SHA1:a04edf6cb2d97539a509d17411a5884f75d5e5cf
                                                SHA256:0a27c51c891f44c26d8db8848822880a8209830faf2d8c00e8729151ae76be4f
                                                SHA512:f52170e2ca58b9c1c4496ba1c27dda4afff45e5a1631b026fd58f0fdb682b0250ca059ffa69d0883dc896d96204c5bdb87855d0a7be7fcdfcafcfbec17379b5a
                                                SSDEEP:12288:wM441/0V9+4tKB7rmCmOcF4my0uJC0b/YvNaOpkXT1KoUflLJ0pZM4e/ZUdtb:D2V9+BfmCcy0CKNaZ1KoUfl2NeBUdt
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../..`............................n.... ........@.. ....................................@................................

                                                File Icon

                                                Icon Hash:8c8caa8e9692aa00

                                                Static PE Info

                                                General

                                                Entrypoint:0x4bf76e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x60C2E92F [Fri Jun 11 04:40:15 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbf7200x4b.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x2a380.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xbf6d80x1c.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xbd7740xbd800False0.896744619888data7.85752472578IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .sdata0xc00000x1e80x200False0.859375data6.61330803525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .rsrc0xc20000x2a3800x2a400False0.124323918269data4.1712627728IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xee0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0xc22b00x2326PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                RT_ICON0xc45d80x10828dBase III DBT, version number 0, next free block index 40
                                                RT_ICON0xd4e000x94a8data
                                                RT_ICON0xde2a80x5488data
                                                RT_ICON0xe37300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                RT_ICON0xe79580x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                RT_ICON0xe9f000x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                RT_ICON0xeafa80x988data
                                                RT_ICON0xeb9300x468GLS_BINARY_LSB_FIRST
                                                RT_GROUP_ICON0xebd980x84data
                                                RT_VERSION0xebe1c0x378data
                                                RT_MANIFEST0xec1940x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightPaul Harris 2016
                                                Assembly Version251.2.0.0
                                                InternalNameConsistency.exe
                                                FileVersion251.2.0.0
                                                CompanyNamePaul Harris
                                                LegalTrademarks
                                                Comments1992 Alpine A 610
                                                ProductNameReloadManager
                                                ProductVersion251.2.0.0
                                                FileDescriptionReloadManager
                                                OriginalFilenameConsistency.exe

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jun 11, 2021 08:06:03.521642923 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:03.714051962 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:03.714257956 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:03.908809900 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:03.909461021 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.102353096 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.102859974 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.299942970 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.347603083 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.363166094 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.566023111 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.566060066 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.566082954 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.566098928 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.566155910 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.566200972 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.567791939 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.575309038 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:04.768460989 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:04.816358089 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:05.035933971 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:05.230448961 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:05.233675003 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:05.426567078 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:05.427282095 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:05.623537064 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:05.625428915 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:05.819279909 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:05.819797993 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:06.051594973 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:06.075284958 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:06.076258898 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:06.271265030 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:06.285085917 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:06.285408020 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:06.285530090 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:06.285640001 CEST49743587192.168.2.3184.95.37.27
                                                Jun 11, 2021 08:06:06.480638027 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:06.480655909 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:06.480664968 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:06.480676889 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:07.882110119 CEST58749743184.95.37.27192.168.2.3
                                                Jun 11, 2021 08:06:07.926053047 CEST49743587192.168.2.3184.95.37.27

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jun 11, 2021 08:04:10.896043062 CEST6015253192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:10.972841978 CEST53601528.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:11.079406977 CEST5754453192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:11.129410028 CEST53575448.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:12.017735004 CEST5598453192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:12.067825079 CEST53559848.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:12.926451921 CEST6418553192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:12.985786915 CEST53641858.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:13.844302893 CEST6511053192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:13.897279024 CEST53651108.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:14.756191969 CEST5836153192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:14.806335926 CEST53583618.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:16.455673933 CEST6349253192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:16.510356903 CEST53634928.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:17.856950045 CEST6083153192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:17.911835909 CEST53608318.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:18.892127991 CEST6010053192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:18.945594072 CEST53601008.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:19.800431013 CEST5319553192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:19.850477934 CEST53531958.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:21.389995098 CEST5014153192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:21.442277908 CEST53501418.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:22.322175026 CEST5302353192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:22.372442007 CEST53530238.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:23.362757921 CEST4956353192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:23.415296078 CEST53495638.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:24.304050922 CEST5135253192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:24.357409954 CEST53513528.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:25.218163013 CEST5934953192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:25.278368950 CEST53593498.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:26.159723997 CEST5708453192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:26.210067987 CEST53570848.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:27.067692995 CEST5882353192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:27.117918968 CEST53588238.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:28.035413027 CEST5756853192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:28.085863113 CEST53575688.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:29.274573088 CEST5054053192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:29.327845097 CEST53505408.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:44.128643036 CEST5436653192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:44.187694073 CEST53543668.8.8.8192.168.2.3
                                                Jun 11, 2021 08:04:44.808346987 CEST5303453192.168.2.38.8.8.8
                                                Jun 11, 2021 08:04:44.880924940 CEST53530348.8.8.8192.168.2.3
                                                Jun 11, 2021 08:05:06.124351978 CEST5776253192.168.2.38.8.8.8
                                                Jun 11, 2021 08:05:06.184209108 CEST53577628.8.8.8192.168.2.3
                                                Jun 11, 2021 08:05:07.454787970 CEST5543553192.168.2.38.8.8.8
                                                Jun 11, 2021 08:05:07.513313055 CEST53554358.8.8.8192.168.2.3
                                                Jun 11, 2021 08:05:20.332308054 CEST5071353192.168.2.38.8.8.8
                                                Jun 11, 2021 08:05:20.391592026 CEST53507138.8.8.8192.168.2.3
                                                Jun 11, 2021 08:05:24.247073889 CEST5613253192.168.2.38.8.8.8
                                                Jun 11, 2021 08:05:24.312432051 CEST53561328.8.8.8192.168.2.3
                                                Jun 11, 2021 08:05:56.457570076 CEST5898753192.168.2.38.8.8.8
                                                Jun 11, 2021 08:05:56.512371063 CEST53589878.8.8.8192.168.2.3
                                                Jun 11, 2021 08:05:58.681667089 CEST5657953192.168.2.38.8.8.8
                                                Jun 11, 2021 08:05:58.740577936 CEST53565798.8.8.8192.168.2.3
                                                Jun 11, 2021 08:06:02.939363003 CEST6063353192.168.2.38.8.8.8
                                                Jun 11, 2021 08:06:03.160412073 CEST53606338.8.8.8192.168.2.3
                                                Jun 11, 2021 08:06:03.177987099 CEST6129253192.168.2.38.8.8.8
                                                Jun 11, 2021 08:06:03.399930954 CEST53612928.8.8.8192.168.2.3

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jun 11, 2021 08:06:02.939363003 CEST192.168.2.38.8.8.80x6c97Standard query (0)mail.bmrtecpack.comA (IP address)IN (0x0001)
                                                Jun 11, 2021 08:06:03.177987099 CEST192.168.2.38.8.8.80xbe8dStandard query (0)mail.bmrtecpack.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jun 11, 2021 08:06:03.160412073 CEST8.8.8.8192.168.2.30x6c97No error (0)mail.bmrtecpack.combmrtecpack.comCNAME (Canonical name)IN (0x0001)
                                                Jun 11, 2021 08:06:03.160412073 CEST8.8.8.8192.168.2.30x6c97No error (0)bmrtecpack.com184.95.37.27A (IP address)IN (0x0001)
                                                Jun 11, 2021 08:06:03.399930954 CEST8.8.8.8192.168.2.30xbe8dNo error (0)mail.bmrtecpack.combmrtecpack.comCNAME (Canonical name)IN (0x0001)
                                                Jun 11, 2021 08:06:03.399930954 CEST8.8.8.8192.168.2.30xbe8dNo error (0)bmrtecpack.com184.95.37.27A (IP address)IN (0x0001)

                                                SMTP Packets

                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Jun 11, 2021 08:06:03.908809900 CEST58749743184.95.37.27192.168.2.3220-gains.impressbss.com ESMTP Exim 4.93 #2 Fri, 11 Jun 2021 11:36:02 +0530
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Jun 11, 2021 08:06:03.909461021 CEST49743587192.168.2.3184.95.37.27EHLO 436432
                                                Jun 11, 2021 08:06:04.102353096 CEST58749743184.95.37.27192.168.2.3250-gains.impressbss.com Hello 436432 [84.17.52.18]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-DSN
                                                250-PIPELINING
                                                250-STARTTLS
                                                250 HELP
                                                Jun 11, 2021 08:06:04.102859974 CEST49743587192.168.2.3184.95.37.27STARTTLS
                                                Jun 11, 2021 08:06:04.299942970 CEST58749743184.95.37.27192.168.2.3220 TLS go ahead

                                                Code Manipulations

                                                Statistics

                                                CPU Usage

                                                Click to jump to process

                                                Memory Usage

                                                Click to jump to process

                                                High Level Behavior Distribution

                                                Click to dive into process behavior distribution

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:08:04:18
                                                Start date:11/06/2021
                                                Path:C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe'
                                                Imagebase:0x150000
                                                File size:951296 bytes
                                                MD5 hash:14F4F4356A708F1E9E18C6C71EF3153E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.219661677.0000000002531000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.220437474.0000000003539000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                General

                                                Start time:08:04:21
                                                Start date:11/06/2021
                                                Path:C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                Imagebase:0x240000
                                                File size:951296 bytes
                                                MD5 hash:14F4F4356A708F1E9E18C6C71EF3153E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                General

                                                Start time:08:04:22
                                                Start date:11/06/2021
                                                Path:C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\HALKBANK_EKSTRE_20210611_080203_744623,PDF.exe
                                                Imagebase:0x9d0000
                                                File size:951296 bytes
                                                MD5 hash:14F4F4356A708F1E9E18C6C71EF3153E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.482152633.0000000003071000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.217706120.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.476523997.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >

                                                  Executed Functions

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (Zb\$(Zb\$(Zb\$(Zb\
                                                  • API String ID: 0-459148938
                                                  • Opcode ID: 9bd3eaa6227023e65fb09b53e4957d36803eea818fae0caaee3b067c3f88c298
                                                  • Instruction ID: f4a57b94c6a84c49d1e2e30a20ee77cd840336a0f8172eb4e6e2183714ae223d
                                                  • Opcode Fuzzy Hash: 9bd3eaa6227023e65fb09b53e4957d36803eea818fae0caaee3b067c3f88c298
                                                  • Instruction Fuzzy Hash: CBA13874E16309DFCB04CFE5D5805AEFBB6FB89711F10A91AD006A7298E334A942EF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (Zb\$(Zb\
                                                  • API String ID: 0-2035941330
                                                  • Opcode ID: 12c5f1f30009c790d1b64c6445a33498f73149f2294242c63583714012023732
                                                  • Instruction ID: ce348e754b1e012ec499f085227562fd0cf2fb665b0f13a76bbe8929f8a80095
                                                  • Opcode Fuzzy Hash: 12c5f1f30009c790d1b64c6445a33498f73149f2294242c63583714012023732
                                                  • Instruction Fuzzy Hash: A4414774E16309DFCB14CFE5D5805AEFBB2FB89711F20A91AD406B7288E734A942DB44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8bd72e724961f190820c512f5d076266c65cea2fe57cb90b1e43d74dcdf36f2
                                                  • Instruction ID: fae22b42e4508915b33b3d3dd080201b9a5657409da01358b321a6cef29875df
                                                  • Opcode Fuzzy Hash: c8bd72e724961f190820c512f5d076266c65cea2fe57cb90b1e43d74dcdf36f2
                                                  • Instruction Fuzzy Hash: 33C1CD31700A018FEB29DB76C450BABB7EABF88745F14486DE146CB291DF35E902DB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad65391cee08c0d7bbaad4c96bf9572a7d0822a797760a9cc2023901b5c8952d
                                                  • Instruction ID: 1dc73fbb490e6b16159d31bfe5e26b780a0a0866158184d90991810a4025cf68
                                                  • Opcode Fuzzy Hash: ad65391cee08c0d7bbaad4c96bf9572a7d0822a797760a9cc2023901b5c8952d
                                                  • Instruction Fuzzy Hash: E291C239E103198FCB04DFA4D8549EDB7BAFF89304F258619E515AB3A0EB34AD45CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c280b5d1a7fb1c5f1402742ec1fe5c076c79847f7d17db0bef6104c9646cc24c
                                                  • Instruction ID: d2c34b3b3a2e5e5ff6ba61aabb1a895d4933ce411b6c31d86e60c63b13d79b69
                                                  • Opcode Fuzzy Hash: c280b5d1a7fb1c5f1402742ec1fe5c076c79847f7d17db0bef6104c9646cc24c
                                                  • Instruction Fuzzy Hash: 5681B135E103198FCB05DFE4D8948DDBBBAFF89304F258619E515AB3A0EB30A985CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 303f37e27d3d99bb6f144c3f6447e59f1709d3d09cf855ef87e93d618552fbaf
                                                  • Instruction ID: 610c51f891a5ed556529797bded4c3637dbadd1e22d2d2fa980ccbb06ef54576
                                                  • Opcode Fuzzy Hash: 303f37e27d3d99bb6f144c3f6447e59f1709d3d09cf855ef87e93d618552fbaf
                                                  • Instruction Fuzzy Hash: 1381A035E103198FCB05DFE0D8849DDBBBAFF89304F258619E515AB7A0EB30A985CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c769dee6a8ad507e00a7dc100a443e0588e25dcc01c750a58981c941b839206f
                                                  • Instruction ID: 8c5451981520ae4e63d2bf37b826f48962c3252790a680228f4414d80db50fec
                                                  • Opcode Fuzzy Hash: c769dee6a8ad507e00a7dc100a443e0588e25dcc01c750a58981c941b839206f
                                                  • Instruction Fuzzy Hash: BD315A70D46228DFDB04DFB5E4487EDBBB0FB0A302F105429E456B7680D778A946EB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 50820785bc83ab62e7361d08fc61f4d933c209bcae223ff3cbad8ebb6595975b
                                                  • Instruction ID: 4b542c9df1af319c634104fde2dcfa7a81d8fd0910cb6eda23bca1a53942646f
                                                  • Opcode Fuzzy Hash: 50820785bc83ab62e7361d08fc61f4d933c209bcae223ff3cbad8ebb6595975b
                                                  • Instruction Fuzzy Hash: 4D313270E05618DBDB00DFB5E448BEDBBF4FB0A302F10582AE442B3680DB786945EB25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 00B670F8
                                                  • GetCurrentThread.KERNEL32 ref: 00B67135
                                                  • GetCurrentProcess.KERNEL32 ref: 00B67172
                                                  • GetCurrentThreadId.KERNEL32 ref: 00B671CB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 7051002ee7fd19cd44a526fee5d22b3df947d40ae394c08a7c1ebf5beb6a7856
                                                  • Instruction ID: 087ce3ba3483ef6191af014ca2a2f436a1e81ffab45510f0bed797b1ef8f666d
                                                  • Opcode Fuzzy Hash: 7051002ee7fd19cd44a526fee5d22b3df947d40ae394c08a7c1ebf5beb6a7856
                                                  • Instruction Fuzzy Hash: FD5187B49006499FDB14CFA9DA48BDEBBF4FF49308F20849AE019B7250DB346844CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 00B670F8
                                                  • GetCurrentThread.KERNEL32 ref: 00B67135
                                                  • GetCurrentProcess.KERNEL32 ref: 00B67172
                                                  • GetCurrentThreadId.KERNEL32 ref: 00B671CB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 2b9b599faaa93e4071c418e2a008f56b49f3b710678030f3649895b427e39f08
                                                  • Instruction ID: 369712df223228115bebc041447f138c04c95ac2b152407fafc4cbce1985c6cd
                                                  • Opcode Fuzzy Hash: 2b9b599faaa93e4071c418e2a008f56b49f3b710678030f3649895b427e39f08
                                                  • Instruction Fuzzy Hash: 585164B4A006498FDB10CFA9E948BDEBBF4EF49308F24849AE119B7350DB745844CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00B6C306
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: d4f7d827b904872ff3081152ab55f2dbdfd5602f7307cfc240595ddc3cbd8e4c
                                                  • Instruction ID: 63b1bb4489671f3669360b600fb1d477f4cf074e8f75aff4f3a4d2b55500007b
                                                  • Opcode Fuzzy Hash: d4f7d827b904872ff3081152ab55f2dbdfd5602f7307cfc240595ddc3cbd8e4c
                                                  • Instruction Fuzzy Hash: EB715570A00B058FD724DF6AD4507AABBF1FF89304F00896AE58ADBB51D739E8458F91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B6E28A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: da6f675b2c452e39a4d45be611f65ab39f07e4a4677cfad0914d569d59dca964
                                                  • Instruction ID: 41bfcb568ce5251eb9c956ed8e66e7ba32458850447fa20af3b5d035eaa1d47f
                                                  • Opcode Fuzzy Hash: da6f675b2c452e39a4d45be611f65ab39f07e4a4677cfad0914d569d59dca964
                                                  • Instruction Fuzzy Hash: 1151C0B5D003499FDB14CF99C884ADEBBB5FF48314F24826AE419AB250D774A985CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B6E28A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: f34e2a66d564eb0d093bd2630675dcbd479ea2e95c27f2552c79274521823b62
                                                  • Instruction ID: 28ceb7c00dfd0a8c6119bce020e2afe6f128d6b825ef59a0798bf9f8384b3fca
                                                  • Opcode Fuzzy Hash: f34e2a66d564eb0d093bd2630675dcbd479ea2e95c27f2552c79274521823b62
                                                  • Instruction Fuzzy Hash: 0E41AFB5D00309AFDB14CF99C884ADEBBF5FF48314F24826AE819AB250D7749945CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B67347
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 70a55185b50ce6b8756408519549ba7625b92b3c25d967b6c30808d3477e1351
                                                  • Instruction ID: f522d4722b7554bd4913c431efb1bab959594e5023ed365c27d74844b1f76aad
                                                  • Opcode Fuzzy Hash: 70a55185b50ce6b8756408519549ba7625b92b3c25d967b6c30808d3477e1351
                                                  • Instruction Fuzzy Hash: 572114B5D00208EFDB10CF99D984ADEBBF4EF48324F14801AE918A7310C378A954CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B67347
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: e4893058ac4ab0f21d6d62ad5f0733a9dc77fcd904017eb59dbfde6efb9b7b08
                                                  • Instruction ID: f36491f359ed224dde9636e32251d9e96a02e814630a2b190b31815c8f1c4ebd
                                                  • Opcode Fuzzy Hash: e4893058ac4ab0f21d6d62ad5f0733a9dc77fcd904017eb59dbfde6efb9b7b08
                                                  • Instruction Fuzzy Hash: CF21E4B5900208AFDB10CF9AD984ADEFBF8EF48324F14801AE914A3310C778A954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B6C381,00000800,00000000,00000000), ref: 00B6C592
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 296912720cc3648b0eee32388675a2e0e1e8a1229d12266979744578658ba647
                                                  • Instruction ID: 9318624a5acd65c3fe3b7a98c168ec94b8f448847f7aadc1bafd592681816f30
                                                  • Opcode Fuzzy Hash: 296912720cc3648b0eee32388675a2e0e1e8a1229d12266979744578658ba647
                                                  • Instruction Fuzzy Hash: DB1144B2D002489FCB10CF9AD844ADEFBF4EF88320F14841AD45AA7600C378A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B6C381,00000800,00000000,00000000), ref: 00B6C592
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: cb508f49bc491f0bfaa1fc22d1e23da5b219c0e884d574339b2975e202907b40
                                                  • Instruction ID: c9d79e756141f2d92d0cfa348332e0f29f92fdcebd2ffa6984d23e5ffc4c263d
                                                  • Opcode Fuzzy Hash: cb508f49bc491f0bfaa1fc22d1e23da5b219c0e884d574339b2975e202907b40
                                                  • Instruction Fuzzy Hash: 88111AB6D002489FCB10CF9AD844BDEFBF4EF58310F14845AD555A7600C379A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 04530E0D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: fe48bcf4d8b080b8fd8e4c0b83411a8eff40859cd5e5c36626406a4e3d9f5204
                                                  • Instruction ID: 8d9e3934208fab0fa8355aa4648f129b39dbe35471152780a56e2d89de16296e
                                                  • Opcode Fuzzy Hash: fe48bcf4d8b080b8fd8e4c0b83411a8eff40859cd5e5c36626406a4e3d9f5204
                                                  • Instruction Fuzzy Hash: CD1103B59003489FDB10CF99D885BDFBBF8FB48320F14841AE969A7640C374A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00B6C306
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 09d2992d981706a32712d12c870f683b904bad178d4b7bc87a2a04de2c31ef6f
                                                  • Instruction ID: c5dfd9fc124764e10f11b23e3010cc8fdfdde53b5ded3332b9de585c51f6e914
                                                  • Opcode Fuzzy Hash: 09d2992d981706a32712d12c870f683b904bad178d4b7bc87a2a04de2c31ef6f
                                                  • Instruction Fuzzy Hash: 5C110FB2D002498FCB10CF9AD444ADEFBF4EF88324F14846AD869B7600C378A945CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 04530E0D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 0383c67d478397c69bf5a2b591a11e54b26e8c8888765864d14b1a9471eee6ef
                                                  • Instruction ID: c488bafe891d4af9dc816071ccf5a69b0d6c0ede2c50596427a7137c2020409a
                                                  • Opcode Fuzzy Hash: 0383c67d478397c69bf5a2b591a11e54b26e8c8888765864d14b1a9471eee6ef
                                                  • Instruction Fuzzy Hash: 1B1103B59003489FDB10DF99D884BDFBBF8FB48720F14845AE955A7240C374A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 04532DB8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotification
                                                  • String ID:
                                                  • API String ID: 2591292051-0
                                                  • Opcode ID: d3220f4f14e84d0e056d03209040f394bd1b01ff8993eb09893f5b7def8e54d1
                                                  • Instruction ID: 6b2dfd799a17c85518c54566ea80368c9ac32804a199c1156d8b2a2035be2734
                                                  • Opcode Fuzzy Hash: d3220f4f14e84d0e056d03209040f394bd1b01ff8993eb09893f5b7def8e54d1
                                                  • Instruction Fuzzy Hash: BC1125B18006499FCB10CF99D5847DEBBF4EF48324F14846AE459A7640D738A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 04532DB8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotification
                                                  • String ID:
                                                  • API String ID: 2591292051-0
                                                  • Opcode ID: d7cf6cb06fe1c30a2496da1d84d193e9d2b19e64bdd0e4237d4f638557d1149b
                                                  • Instruction ID: 09931eb62446f2d4ced68f43e9d737760376c48bec8d846a0eb42cfb107178b6
                                                  • Opcode Fuzzy Hash: d7cf6cb06fe1c30a2496da1d84d193e9d2b19e64bdd0e4237d4f638557d1149b
                                                  • Instruction Fuzzy Hash: AB1142B18006099FCB10CF99D484BDEFBF4EF88320F14846AE969A7340C738A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowLongW.USER32(?,?,?), ref: 00B6E41D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID:
                                                  • API String ID: 1378638983-0
                                                  • Opcode ID: 93541e22791422bf08d1f9bc989a099d9909cec701a1b136f056751fc0856595
                                                  • Instruction ID: 6d83f674ca5589c4084b62dc74760891afb740b91033d2401fe6067991de9769
                                                  • Opcode Fuzzy Hash: 93541e22791422bf08d1f9bc989a099d9909cec701a1b136f056751fc0856595
                                                  • Instruction Fuzzy Hash: B01125B5800249DFDB10CF99D489BDEFBF4EF48324F10855AE465A7640C374A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowLongW.USER32(?,?,?), ref: 00B6E41D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID:
                                                  • API String ID: 1378638983-0
                                                  • Opcode ID: ef54f85a47672c86fec622789bd6646eb0a65534feebb97f80c25c5fcd066a5c
                                                  • Instruction ID: 7aa6c38f61e0be92037837530e7ddad7987e1fbf40da349aeaea5e650f2dbb52
                                                  • Opcode Fuzzy Hash: ef54f85a47672c86fec622789bd6646eb0a65534feebb97f80c25c5fcd066a5c
                                                  • Instruction Fuzzy Hash: A811E5B59002499FDB10CF99D585BDEFBF8EF48324F14845AE965A7700C374A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219162360.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 985d2a06894258876420bb77312828f55e8ea1d18cfbba009d282acef79bb096
                                                  • Instruction ID: b493e6eba7744f9d88aa44a7cebb02512daa4befc6bfb9b3ab849aa851960acc
                                                  • Opcode Fuzzy Hash: 985d2a06894258876420bb77312828f55e8ea1d18cfbba009d282acef79bb096
                                                  • Instruction Fuzzy Hash: 302167B1504384DFCB00CF44D9C0B6BBBA5FB8932CF208569E9058F246C33AD84ACBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219162360.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4267f4c6ec9dd01fc8763abfc4c2dd3806215082c6d312185dc8f34f60f9a9fb
                                                  • Instruction ID: c55e93d68686a1f70a2018c93b40fd830477381ae0ef69880c06d7bfd8326d3f
                                                  • Opcode Fuzzy Hash: 4267f4c6ec9dd01fc8763abfc4c2dd3806215082c6d312185dc8f34f60f9a9fb
                                                  • Instruction Fuzzy Hash: 0C2148B1504384DFDB01CF54D8C0B56FB65FB85314F208569E9058B246C336D84AC7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219197811.000000000090D000.00000040.00000001.sdmp, Offset: 0090D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0e73f49daa747bb0abe1323420c560ea3f7a89c0e6926c8af3c8efd123388fb8
                                                  • Instruction ID: a5f618576dbad7eb07f3032d8b7628b3f7b5d0119e09ef4ade6c20e1503bca1c
                                                  • Opcode Fuzzy Hash: 0e73f49daa747bb0abe1323420c560ea3f7a89c0e6926c8af3c8efd123388fb8
                                                  • Instruction Fuzzy Hash: FC212975505304EFDB05DF98D9C0B26BBA9FB84314F24C96DE9094B286C73AD846CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219197811.000000000090D000.00000040.00000001.sdmp, Offset: 0090D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0b5eef751e201052d70396bd794a65e9b09b32e5bf210676e6815c7308f193ff
                                                  • Instruction ID: 00051087fcfe7e9c4411b8d7df8aba1a5f14f249c95d176b57bd3890850e8d35
                                                  • Opcode Fuzzy Hash: 0b5eef751e201052d70396bd794a65e9b09b32e5bf210676e6815c7308f193ff
                                                  • Instruction Fuzzy Hash: 4A210775504244DFDB14CF94D9C4B16BBB9FB84314F24C969D90D4B286C73BD847CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219162360.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7830017204db7e3d4182d590c31becd9b77eabd227f248ef1e89515690348287
                                                  • Instruction ID: 1b6e7dd08f8df81bbfb1d48ee4194dffeb2ed5b85aa789e33176e5e62ee67389
                                                  • Opcode Fuzzy Hash: 7830017204db7e3d4182d590c31becd9b77eabd227f248ef1e89515690348287
                                                  • Instruction Fuzzy Hash: 9611BE76404380DFCB16CF10D9C4B16FF71FB85324F2886AAD8054B656C33AD85ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219162360.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7830017204db7e3d4182d590c31becd9b77eabd227f248ef1e89515690348287
                                                  • Instruction ID: 0b90c4e4cf3dd38920daaba8c9ae88be78b5aaf1ff90b8c7f855f7e619b7d62f
                                                  • Opcode Fuzzy Hash: 7830017204db7e3d4182d590c31becd9b77eabd227f248ef1e89515690348287
                                                  • Instruction Fuzzy Hash: B2119376504380DFCB15CF14D9C4B16BF71FB95324F24C6A9D8054B656C33AD85ACBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219197811.000000000090D000.00000040.00000001.sdmp, Offset: 0090D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9b27ccd0c6e9cd5d5fac7b753561478180e5e4d36535b89a7e91250606eb9eda
                                                  • Instruction ID: 6e666cbdc4d961888aafe93c42656a2056d20851719b6568b15d07d9da488513
                                                  • Opcode Fuzzy Hash: 9b27ccd0c6e9cd5d5fac7b753561478180e5e4d36535b89a7e91250606eb9eda
                                                  • Instruction Fuzzy Hash: CF118E75504280DFCB11CF54D5C4B16BB71FB44324F24C6AAD8494B696C33AD84ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219197811.000000000090D000.00000040.00000001.sdmp, Offset: 0090D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9b27ccd0c6e9cd5d5fac7b753561478180e5e4d36535b89a7e91250606eb9eda
                                                  • Instruction ID: 6dc6f9a59d238f30a3ba4cf74b2196ac3d75d29bd1386cf4fad4e25c37fb3724
                                                  • Opcode Fuzzy Hash: 9b27ccd0c6e9cd5d5fac7b753561478180e5e4d36535b89a7e91250606eb9eda
                                                  • Instruction Fuzzy Hash: 9111DD76505280DFDB01CF58D5C4B15FBB1FB84324F28C6AED8494B696C33AD84ACB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219162360.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25c631fea9d8ad711d950086487441b4011697823f491082aaeb1a49fdcc679c
                                                  • Instruction ID: 65d54a6000c842183dc3e97496b263b61e9b90301844f6abc1897029054806c8
                                                  • Opcode Fuzzy Hash: 25c631fea9d8ad711d950086487441b4011697823f491082aaeb1a49fdcc679c
                                                  • Instruction Fuzzy Hash: 6E01F7714093C8AEE7104B16DCC07A6FB9CFF56728F18845AED058F282C7789C48C6B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219162360.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40400892adf6dc9a9949d8e7e8ccf0f3dddcf28f9c6edc4473a662f558038eb6
                                                  • Instruction ID: 36333b66467191258856c560bc3f96ff63478757ad38997580614208c92e5b8e
                                                  • Opcode Fuzzy Hash: 40400892adf6dc9a9949d8e7e8ccf0f3dddcf28f9c6edc4473a662f558038eb6
                                                  • Instruction Fuzzy Hash: 7CF06271405784AFE7108B16DDC4B66FB9CEB52734F18C55AED085B282C3799C48CAB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0bad10703eb14fbf70742c724cc5009c011124e2cd06fea88bdf39917bd05978
                                                  • Instruction ID: c2658ec83f3537e8a16566cb1b2369b61cc518e26c301a58fb4c58e886462e90
                                                  • Opcode Fuzzy Hash: 0bad10703eb14fbf70742c724cc5009c011124e2cd06fea88bdf39917bd05978
                                                  • Instruction Fuzzy Hash: 9502C3F1C917468AE313DF65E8981887BB9B746328FD04A08D3617BAD1D7B8116ECF84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.219440996.0000000000B60000.00000040.00000001.sdmp, Offset: 00B60000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ac31d30c4e2520bd6744f7067acf7b5ebc9f183662af6c4f6afdf7809beb0871
                                                  • Instruction ID: 832a093179d5fc14851b3267196bf34e54d8ff4e994d1c6ba2d0fc933c5f89cf
                                                  • Opcode Fuzzy Hash: ac31d30c4e2520bd6744f7067acf7b5ebc9f183662af6c4f6afdf7809beb0871
                                                  • Instruction Fuzzy Hash: 80A16D32E0021A8FCF15DFA5C8449DEBBF6FF85300B1585AAE905FB221EB75A955CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b374ac75fd380d34715c47a90f6217411fec2f86f6d90523ee2e1862f1cf5cd2
                                                  • Instruction ID: 27c8c33bc478aeb102e5ff5cd1d33d8b7cd1b0fbcb00e8b22e42a535124c0c22
                                                  • Opcode Fuzzy Hash: b374ac75fd380d34715c47a90f6217411fec2f86f6d90523ee2e1862f1cf5cd2
                                                  • Instruction Fuzzy Hash: 0F310170D05618CFDB24CFA5E848BEDBBF1BB09306F1088AAE405B7240D7B8A945EB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.221234518.0000000004530000.00000040.00000001.sdmp, Offset: 04530000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 68aef72600763d5b318f39f8b9503cfd11f66b7a6af7040d2090245ef5432ece
                                                  • Instruction ID: a98f1e0685bebdb0ddbf45fcc8dc3d63df969d993018e7c3583601a51a692613
                                                  • Opcode Fuzzy Hash: 68aef72600763d5b318f39f8b9503cfd11f66b7a6af7040d2090245ef5432ece
                                                  • Instruction Fuzzy Hash: 61314970D05619CFDB20CFA4E848BEDBBF1BB09306F0058AAE401B7240D7B8A945EF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Executed Functions

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 13c7bffcccb694820b2ef24a766779b455ec203b7fb18cf869318400ef7c7419
                                                  • Instruction ID: 3607eaea171255a42f0302b0932244d320853917d8d6b4f87cecaf57f642488b
                                                  • Opcode Fuzzy Hash: 13c7bffcccb694820b2ef24a766779b455ec203b7fb18cf869318400ef7c7419
                                                  • Instruction Fuzzy Hash: 8E621834E006198FDB24EF78C9546DDB7B2AF89300F1185AAD54AAB354EF309E85CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479917485.0000000001230000.00000040.00000001.sdmp, Offset: 01230000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 56c4e936885d8ce099f0dd226ff4d885d7e020cbadcbfea0ab10b58ec4dc5740
                                                  • Instruction ID: 2109f329535bb8a9b258ec127c4ffb3fffbcfa6b3c2412fda857b9a4f1188c98
                                                  • Opcode Fuzzy Hash: 56c4e936885d8ce099f0dd226ff4d885d7e020cbadcbfea0ab10b58ec4dc5740
                                                  • Instruction Fuzzy Hash: EBF18F70A1020ACFDB14DFA9C884BADBBF1FF88304F558569E509AF265DB70E845CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479951505.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID: j
                                                  • API String ID: 2994545307-2137352139
                                                  • Opcode ID: 35944ee9abbdd60b7f34e59d0de10209fc220d211d88bbb87480a685975867f5
                                                  • Instruction ID: 92c791f78903f472c9931e142c7fcba331c98f6eefb947214e2bd85634a833e6
                                                  • Opcode Fuzzy Hash: 35944ee9abbdd60b7f34e59d0de10209fc220d211d88bbb87480a685975867f5
                                                  • Instruction Fuzzy Hash: D751F130A102059FDB19AB78C884AEEB7B6FF85300F11857AE506EB391EB74DC05CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479951505.0000000001240000.00000040.00000001.sdmp, Offset: 01240000, based on PE: false
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 0ba05ed3ce28531fd52dedad169b8640832a3d8902786c8351db807bec5fa19c
                                                  • Instruction ID: 196d6ca3ae745e0ac485896cfb2768d773a6ff79ef4b4acc5abb33762e1b58bb
                                                  • Opcode Fuzzy Hash: 0ba05ed3ce28531fd52dedad169b8640832a3d8902786c8351db807bec5fa19c
                                                  • Instruction Fuzzy Hash: D851A531A102059FDB14EFB4D854AEEB7B6FF84204F118969D5169B390EF74DC44CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1bdb25353c5c52545bb8241e5bf181e3e2f1a1631b81171a3577bae1ecd72e86
                                                  • Instruction ID: 7003b87638d79681e5cd57f8abf94d1a1ab85c9bcc16b80a0ea2243cbfd990ac
                                                  • Opcode Fuzzy Hash: 1bdb25353c5c52545bb8241e5bf181e3e2f1a1631b81171a3577bae1ecd72e86
                                                  • Instruction Fuzzy Hash: D4413771D0435A8FCB04CFA9D8046EEBBF4EF89210F0585AAD514EB351EB749885CBE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 01172514
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 5e36f621fd93820ca4a959fe0566b4ee51f9f98aff4a49927bf65a0a7f37ec45
                                                  • Instruction ID: 34fa99d1f0bb3c2b1f8a930fd2823efd3bba65fd457b6bbc4a9268f8e5f2e06a
                                                  • Opcode Fuzzy Hash: 5e36f621fd93820ca4a959fe0566b4ee51f9f98aff4a49927bf65a0a7f37ec45
                                                  • Instruction Fuzzy Hash: F64156B0E053499FDB04CFA9C544A9EBBF5BF49304F29C16AE409AB351C7749845CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 011727D1
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: QueryValue
                                                  • String ID:
                                                  • API String ID: 3660427363-0
                                                  • Opcode ID: e4ee865b068bec22a86b87c39a1e2e7006c617fa7353200d1ae681923e04f6cc
                                                  • Instruction ID: ad9b2de22e6e37d121850e0605b1c28f3737edcab80ac1eee73f11812c647ac9
                                                  • Opcode Fuzzy Hash: e4ee865b068bec22a86b87c39a1e2e7006c617fa7353200d1ae681923e04f6cc
                                                  • Instruction Fuzzy Hash: 0031E0B1D00258DFCB24CF9AD984A9EFBF5BF48310F15802AE819AB300D774A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 011727D1
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: QueryValue
                                                  • String ID:
                                                  • API String ID: 3660427363-0
                                                  • Opcode ID: 5551c499895f4f96143543575e5d5ec786457c32b1a65d83a50f1d2befff9098
                                                  • Instruction ID: 5193e291643664d06d63364da07d91105824958c3ca8045d9269b1a51b9a6593
                                                  • Opcode Fuzzy Hash: 5551c499895f4f96143543575e5d5ec786457c32b1a65d83a50f1d2befff9098
                                                  • Instruction Fuzzy Hash: 4B31DFB1D002589FCB24CF99D984A9EFBF5AF48310F15812AE819AB350D7749945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 01172514
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 6dc8c3b2836d69086af9977d38c895bd8f0c12a23f7bdad73b093d7065e94dfb
                                                  • Instruction ID: 274e3f313dc6510d9df91eeb68185d0565ce9ecf1754609315894794a947d2ce
                                                  • Opcode Fuzzy Hash: 6dc8c3b2836d69086af9977d38c895bd8f0c12a23f7bdad73b093d7065e94dfb
                                                  • Instruction Fuzzy Hash: 603101B0D04248DFDB14CF99C584A8EFBF5BF48304F29C16AE80AAB341C7759885CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,01237D89,00000800), ref: 01237E1A
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479917485.0000000001230000.00000040.00000001.sdmp, Offset: 01230000, based on PE: false
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 71c8b84fbd2824441f422dba5657b357f439cde22352c713fd77ec4a0c8ddaaf
                                                  • Instruction ID: 93ebe808aca2f89b1e6eaae3e234ee5def7b5cfe873f049906bf291f50f66c09
                                                  • Opcode Fuzzy Hash: 71c8b84fbd2824441f422dba5657b357f439cde22352c713fd77ec4a0c8ddaaf
                                                  • Instruction Fuzzy Hash: ED2184B69042498FCB10CFA9D444AEEFBF4EF89314F05842EC51AAB201C375A846CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0117E4FA), ref: 0117E5E7
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 8f3400a421513ac45c7aafcd1bc0de77ef85a615d1b01a28b8ae89e6f789ff9a
                                                  • Instruction ID: 37fe5f27ed23364fea2d563e3b926c2ba1eec0e3f10e9b6643f533091d961664
                                                  • Opcode Fuzzy Hash: 8f3400a421513ac45c7aafcd1bc0de77ef85a615d1b01a28b8ae89e6f789ff9a
                                                  • Instruction Fuzzy Hash: 6B1133B1C006199BCB10CF9AD4447DEFBF4AF48224F15816AE818B7200E778A944CFE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,01237D89,00000800), ref: 01237E1A
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479917485.0000000001230000.00000040.00000001.sdmp, Offset: 01230000, based on PE: false
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 343df828a661063030206f5ef2f8e4ca43edcf2f51e82be9d6e4426a7d1221be
                                                  • Instruction ID: aa7f7924c44928af08c13ceebee781a009ff39ae24a38e4b506f9b4fa8397054
                                                  • Opcode Fuzzy Hash: 343df828a661063030206f5ef2f8e4ca43edcf2f51e82be9d6e4426a7d1221be
                                                  • Instruction Fuzzy Hash: 151117B69002099FDB10CF9AD448BEEFBF4EB88310F05842EE515A7600C774A945CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0117E4FA), ref: 0117E5E7
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479427104.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 9c4099d9b0de991a0a0857c9168d76e6d14e6eb6e7d7f7588f5ddd71974bd2e4
                                                  • Instruction ID: 29bcd3a5dc7894b9da0e10b129c8fe13735a4fd744ed980f6487d8d7f475f9b6
                                                  • Opcode Fuzzy Hash: 9c4099d9b0de991a0a0857c9168d76e6d14e6eb6e7d7f7588f5ddd71974bd2e4
                                                  • Instruction Fuzzy Hash: 341106B1C046599FCB10CF99D5447DEFBF4AF48324F15816AE818B7240D7789945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 0123B745
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479917485.0000000001230000.00000040.00000001.sdmp, Offset: 01230000, based on PE: false
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: 21480fde42efe83bdd551c7eacde45784947fbae51dbbfaccb3f2f485312fe6c
                                                  • Instruction ID: 13c15aa32bacfe73a3b88dc26b73ed6b5b1a39632f352ea3371a13a8f1a78cdc
                                                  • Opcode Fuzzy Hash: 21480fde42efe83bdd551c7eacde45784947fbae51dbbfaccb3f2f485312fe6c
                                                  • Instruction Fuzzy Hash: A91115B59007498FCB10CF99D848BDEFBF4EB48324F14845AD519A7700C774A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 0123B745
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479917485.0000000001230000.00000040.00000001.sdmp, Offset: 01230000, based on PE: false
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: 94ee7163a427e1ba69b37b073a912c2992d7b988ddbcf3fc59cebd15fbaa2825
                                                  • Instruction ID: 9d01f9746e09a1ba7954f358bcb646625101aafae34c7734feb7a42f64601091
                                                  • Opcode Fuzzy Hash: 94ee7163a427e1ba69b37b073a912c2992d7b988ddbcf3fc59cebd15fbaa2825
                                                  • Instruction Fuzzy Hash: 031115B6D002498FCB10CF99D884BDEFBF8EB48324F14851AD519A7700C378A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479584209.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f3edef06d80aad37f1047dc90021cdc32cc3dc2360cf7138e51151fd99435406
                                                  • Instruction ID: 4f5ae478e379bba1d2983b9967d1f62298bfa5a7d5bd989c8cf62e42e6d9c052
                                                  • Opcode Fuzzy Hash: f3edef06d80aad37f1047dc90021cdc32cc3dc2360cf7138e51151fd99435406
                                                  • Instruction Fuzzy Hash: 8D212575504200DFDF1DCF98E8C4B96BB65FB88358F24C969D9094B246C73BD846CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.479584209.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cb1629cb91b476472892770cc63c188a299300185504010ab81926e5338ad321
                                                  • Instruction ID: 658b668d3bd79fc5e6af0e181b5d9329638b6b74c3a6b906c5511663ec9d6398
                                                  • Opcode Fuzzy Hash: cb1629cb91b476472892770cc63c188a299300185504010ab81926e5338ad321
                                                  • Instruction Fuzzy Hash: 822150755083809FCB06CF64D9D4B15BF71EB46214F28C5EAD8498F2A7C33A985ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions