Loading ...

Play interactive tourEdit tour

Analysis Report PO #R58490.exe

Overview

General Information

Sample Name:PO #R58490.exe
Analysis ID:433199
MD5:5cff42958cd317e239d575732f7f9114
SHA1:dec2ad475f2989f5096e02e00b45b265dd10c8c0
SHA256:8636a1af1afb3fa83c218cbc4a18f37782b835d4ab8b27148d6f99cb849453a3
Tags:exe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Installs a global keyboard hook
Machine Learning detection for sample
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • PO #R58490.exe (PID: 5396 cmdline: 'C:\Users\user\Desktop\PO #R58490.exe' MD5: 5CFF42958CD317E239D575732F7F9114)
    • PO #R58490.exe (PID: 4724 cmdline: C:\Users\user\Desktop\PO #R58490.exe MD5: 5CFF42958CD317E239D575732F7F9114)
    • PO #R58490.exe (PID: 3840 cmdline: C:\Users\user\Desktop\PO #R58490.exe MD5: 5CFF42958CD317E239D575732F7F9114)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "mmardones@cavilum.cl", "Password": "Cavilum4313", "Host": "mail.cavilum.cl"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.PO #R58490.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.PO #R58490.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.2.PO #R58490.exe.3c75d68.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.PO #R58490.exe.3c75d68.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    4.0.PO #R58490.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 4.2.PO #R58490.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "mmardones@cavilum.cl", "Password": "Cavilum4313", "Host": "mail.cavilum.cl"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO #R58490.exeVirustotal: Detection: 31%Perma Link
                      Source: PO #R58490.exeReversingLabs: Detection: 34%
                      Machine Learning detection for sampleShow sources
                      Source: PO #R58490.exeJoe Sandbox ML: detected
                      Source: 4.2.PO #R58490.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 4.0.PO #R58490.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: PO #R58490.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: PO #R58490.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: MessageData.pdb source: PO #R58490.exe
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h1_2_04BF1F98
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h1_2_04BF3538
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h1_2_04BF3528
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h1_2_04BF1F87
                      Source: global trafficTCP traffic: 192.168.2.3:49739 -> 186.64.116.165:587
                      Source: Joe Sandbox ViewIP Address: 186.64.116.165 186.64.116.165
                      Source: Joe Sandbox ViewASN Name: ZAMLTDACL ZAMLTDACL
                      Source: global trafficTCP traffic: 192.168.2.3:49739 -> 186.64.116.165:587
                      Source: unknownDNS traffic detected: queries for: mail.cavilum.cl
                      Source: PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                      Source: PO #R58490.exe, 00000004.00000002.475838803.0000000002D92000.00000004.00000001.sdmpString found in binary or memory: http://mail.cavilum.cl
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0#
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: PO #R58490.exe, 00000001.00000002.213257824.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpString found in binary or memory: http://xUGEzQ.com
                      Source: PO #R58490.exe, 00000004.00000002.475566216.0000000002D31000.00000004.00000001.sdmpString found in binary or memory: https://49Z9TKhGLJ3VymNKQj.org
                      Source: PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%x
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: PO #R58490.exe, 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, PO #R58490.exe, 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\PO #R58490.exeJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 4.2.PO #R58490.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b4CBB2D31u002d148Au002d425Bu002d9E13u002dA0334C574922u007d/u0037E4B068Cu002dA301u002d4858u002d83C3u002d09A6DFCD7C4F.csLarge array initialization: .cctor: array initializer size 11981
                      Source: 4.0.PO #R58490.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b4CBB2D31u002d148Au002d425Bu002d9E13u002dA0334C574922u007d/u0037E4B068Cu002dA301u002d4858u002d83C3u002d09A6DFCD7C4F.csLarge array initialization: .cctor: array initializer size 11981
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_0108C7481_2_0108C748
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_0108AD781_2_0108AD78
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_04BF28501_2_04BF2850
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_04BF00321_2_04BF0032
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_04BF00401_2_04BF0040
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_04BF023D1_2_04BF023D
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 1_2_04BF02011_2_04BF0201
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5D4D84_2_00B5D4D8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B580C04_2_00B580C0
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5B0304_2_00B5B030
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B536304_2_00B53630
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B50BB04_2_00B50BB0
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5A5F04_2_00B5A5F0
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B575284_2_00B57528
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E760F84_2_00E760F8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E768304_2_00E76830
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E75AC14_2_00E75AC1
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E7EF384_2_00E7EF38
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E7D8984_2_00E7D898
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F200CA4_2_00F200CA
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F289384_2_00F28938
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F24B504_2_00F24B50
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F259B84_2_00F259B8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F259A84_2_00F259A8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F29AA84_2_00F29AA8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F277804_2_00F27780
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F2EB604_2_00F2EB60
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F3E1C84_2_00F3E1C8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F30DC84_2_00F30DC8
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F392684_2_00F39268
                      Source: PO #R58490.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: PO #R58490.exe, 00000001.00000002.217049674.0000000005DA0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000001.00000000.201416244.0000000000912000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMessageData.exe< vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKygo.dll* vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamelOQFXsEdnXbPfrLurEHOqbAcVpqnQnZ.exe4 vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000002.00000000.209746324.00000000003A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMessageData.exe< vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000004.00000002.473573012.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000004.00000002.470468038.0000000000722000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMessageData.exe< vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamelOQFXsEdnXbPfrLurEHOqbAcVpqnQnZ.exe4 vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000004.00000002.470594304.0000000000AF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000004.00000002.473487396.0000000000E40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs PO #R58490.exe
                      Source: PO #R58490.exe, 00000004.00000002.473502616.0000000000E50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs PO #R58490.exe
                      Source: PO #R58490.exeBinary or memory string: OriginalFilenameMessageData.exe< vs PO #R58490.exe
                      Source: PO #R58490.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: PO #R58490.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: PO #R58490.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: PO #R58490.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.0.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.0.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.0.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.0.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 4.2.PO #R58490.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.2.PO #R58490.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@5/2@1/1
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO #R58490.exe.logJump to behavior
                      Source: PO #R58490.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\PO #R58490.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO #R58490.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: PO #R58490.exeVirustotal: Detection: 31%
                      Source: PO #R58490.exeReversingLabs: Detection: 34%
                      Source: unknownProcess created: C:\Users\user\Desktop\PO #R58490.exe 'C:\Users\user\Desktop\PO #R58490.exe'
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess created: C:\Users\user\Desktop\PO #R58490.exe C:\Users\user\Desktop\PO #R58490.exe
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess created: C:\Users\user\Desktop\PO #R58490.exe C:\Users\user\Desktop\PO #R58490.exe
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess created: C:\Users\user\Desktop\PO #R58490.exe C:\Users\user\Desktop\PO #R58490.exeJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess created: C:\Users\user\Desktop\PO #R58490.exe C:\Users\user\Desktop\PO #R58490.exeJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: PO #R58490.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO #R58490.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: PO #R58490.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: MessageData.pdb source: PO #R58490.exe

                      Data Obfuscation:

                      barindex
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: PO #R58490.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 1.0.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 1.2.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 2.0.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 2.2.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 4.2.PO #R58490.exe.640000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 4.0.PO #R58490.exe.640000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 4.0.PO #R58490.exe.640000.2.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5A4AA push eax; retf 4_2_00B5A4B1
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5ECF0 push ebx; iretd 4_2_00B5ED8E
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5C436 push 4800B3DBh; retf 4_2_00B5C43D
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B561B0 push edi; iretd 4_2_00B561FE
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5A5E6 push 9000B3CCh; retf 4_2_00B5A5ED
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B5EE08 push ebx; iretd 4_2_00B5EE16
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B56380 push esp; retf 4_2_00B56915
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B50B68 push edi; iretd 4_2_00B50B76
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E70034 push esp; iretd 4_2_00E7003E
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E7D55A push ebp; iretd 4_2_00E7D559
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E7B517 push edi; retn 0000h4_2_00E7B519
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E7D51A push ebp; iretd 4_2_00E7D559
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00E7D37E pushfd ; retf 4_2_00E7D38D
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F312C0 push esp; iretd 4_2_00F3134E
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00F31802 push edx; iretd 4_2_00F31A16
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85720013511
                      Source: PO #R58490.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 1.0.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 1.2.PO #R58490.exe.830000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 2.0.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 2.2.PO #R58490.exe.2c0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 4.2.PO #R58490.exe.640000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 4.0.PO #R58490.exe.640000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 4.0.PO #R58490.exe.640000.2.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'oDAuwt', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: C:\Users\user\Desktop\PO #R58490.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO #R58490.exe PID: 5396, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\PO #R58490.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeWindow / User API: threadDelayed 1785Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeWindow / User API: threadDelayed 8078Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exe TID: 4812Thread sleep time: -99553s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exe TID: 6104Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exe TID: 2172Thread sleep time: -12912720851596678s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exe TID: 5936Thread sleep count: 1785 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exe TID: 5936Thread sleep count: 8078 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO #R58490.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO #R58490.exeThread delayed: delay time: 99553Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: PO #R58490.exe, 00000004.00000002.473441492.0000000000E08000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllCaps
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: PO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeCode function: 4_2_00B580C0 LdrInitializeThunk,4_2_00B580C0
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess created: C:\Users\user\Desktop\PO #R58490.exe C:\Users\user\Desktop\PO #R58490.exeJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeProcess created: C:\Users\user\Desktop\PO #R58490.exe C:\Users\user\Desktop\PO #R58490.exeJump to behavior
                      Source: PO #R58490.exe, 00000004.00000002.473840072.0000000001480000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: PO #R58490.exe, 00000004.00000002.473840072.0000000001480000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: PO #R58490.exe, 00000004.00000002.473840072.0000000001480000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: PO #R58490.exe, 00000004.00000002.473840072.0000000001480000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Users\user\Desktop\PO #R58490.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Users\user\Desktop\PO #R58490.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.2.PO #R58490.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.PO #R58490.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO #R58490.exe PID: 5396, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO #R58490.exe PID: 3840, type: MEMORY
                      Source: Yara matchFile source: 4.2.PO #R58490.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.PO #R58490.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\PO #R58490.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO #R58490.exe PID: 3840, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.2.PO #R58490.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.PO #R58490.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO #R58490.exe PID: 5396, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO #R58490.exe PID: 3840, type: MEMORY
                      Source: Yara matchFile source: 4.2.PO #R58490.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.PO #R58490.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO #R58490.exe.3c75d68.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection12File and Directory Permissions Modification1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture11Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Credentials in Registry1Security Software Discovery211SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSProcess Discovery2Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing13LSA SecretsVirtualization/Sandbox Evasion131SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PO #R58490.exe31%VirustotalBrowse
                      PO #R58490.exe35%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      PO #R58490.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.PO #R58490.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      4.0.PO #R58490.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      mail.cavilum.cl0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://api.ipify.org%x0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://mail.cavilum.cl0%VirustotalBrowse
                      http://mail.cavilum.cl0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://xUGEzQ.com0%Avira URL Cloudsafe
                      https://49Z9TKhGLJ3VymNKQj.org0%Avira URL Cloudsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://r3.i.lencr.org/0#0%URL Reputationsafe
                      http://r3.i.lencr.org/0#0%URL Reputationsafe
                      http://r3.i.lencr.org/0#0%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://r3.i.lencr.org0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.cavilum.cl
                      186.64.116.165
                      truetrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org%xPO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://127.0.0.1:HTTP/1.1PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSPO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://cps.letsencrypt.org0PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://mail.cavilum.clPO #R58490.exe, 00000004.00000002.475838803.0000000002D92000.00000004.00000001.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://x1.c.lencr.org/0PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://xUGEzQ.comPO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://49Z9TKhGLJ3VymNKQj.orgPO #R58490.exe, 00000004.00000002.475566216.0000000002D31000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.o.lencr.org0PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.org%GETMozilla/5.0PO #R58490.exe, 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      low
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO #R58490.exe, 00000001.00000002.213257824.0000000002BB1000.00000004.00000001.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPO #R58490.exe, 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, PO #R58490.exe, 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssPO #R58490.exe, 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmpfalse
                          high
                          http://r3.i.lencr.org/0#PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://cps.root-x1.letsencrypt.org0PO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://r3.i.lencr.orgPO #R58490.exe, 00000004.00000002.482237302.00000000060A0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          186.64.116.165
                          mail.cavilum.clChile
                          52368ZAMLTDACLtrue

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:433199
                          Start date:11.06.2021
                          Start time:12:47:22
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 8m 44s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:PO #R58490.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:26
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.adwa.spyw.evad.winEXE@5/2@1/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 1.7% (good quality ratio 1.1%)
                          • Quality average: 52.5%
                          • Quality standard deviation: 44.2%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 61
                          • Number of non-executed functions: 8
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                          • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 13.64.90.137, 104.43.139.144, 20.82.209.183, 23.218.208.56, 20.54.26.129, 20.82.210.154, 92.122.213.247, 92.122.213.194
                          • Excluded domains from analysis (whitelisted): www.bing.com, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          12:48:12API Interceptor813x Sleep call for process: PO #R58490.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          186.64.116.165Cotizaci#U00f3n.exeGet hashmaliciousBrowse
                            Confirmaci#U00f3n de env#U00edo.exeGet hashmaliciousBrowse
                              Purchase Order.exeGet hashmaliciousBrowse
                                Order #6762.exeGet hashmaliciousBrowse
                                  Urgent Quote.exeGet hashmaliciousBrowse
                                    Quotation.exeGet hashmaliciousBrowse
                                      6VIB0nWd6H.exeGet hashmaliciousBrowse
                                        67ONSqP4Cl.exeGet hashmaliciousBrowse
                                          dKWw5dCC4L.exeGet hashmaliciousBrowse

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            mail.cavilum.clCotizaci#U00f3n.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Confirmaci#U00f3n de env#U00edo.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Purchase Order.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Order #6762.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Urgent Quote.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Quotation.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            6VIB0nWd6H.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            67ONSqP4Cl.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            dKWw5dCC4L.exeGet hashmaliciousBrowse
                                            • 186.64.116.165

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            ZAMLTDACLCotizaci#U00f3n.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Confirmaci#U00f3n de env#U00edo.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Purchase Order.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Order #6762.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Urgent Quote.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            Quotation.exeGet hashmaliciousBrowse
                                            • 186.64.116.165
                                            #Ud83d#Udd7b Missed Playback Recording.wav - 1424592794.htmGet hashmaliciousBrowse
                                            • 186.64.116.45
                                            Sales_Receipt 5576.xlsGet hashmaliciousBrowse
                                            • 186.64.118.235
                                            OUTSTANDING_INVOICE_Statement_077117.xlsmGet hashmaliciousBrowse
                                            • 186.64.116.95
                                            file.docGet hashmaliciousBrowse
                                            • 186.64.118.225
                                            Ordine -159-pdf.exeGet hashmaliciousBrowse
                                            • 186.64.118.215
                                            Rep_#_475.xlsmGet hashmaliciousBrowse
                                            • 186.64.116.135
                                            Subconract 504.xlsmGet hashmaliciousBrowse
                                            • 186.64.116.135
                                            Webinar.exeGet hashmaliciousBrowse
                                            • 186.64.118.125
                                            QC-Telecom.exeGet hashmaliciousBrowse
                                            • 186.64.118.125
                                            Io8ic2291n.docGet hashmaliciousBrowse
                                            • 190.114.254.163
                                            k5K4BcM1b5.exeGet hashmaliciousBrowse
                                            • 186.64.118.110
                                            0QKsIlEBln.exeGet hashmaliciousBrowse
                                            • 186.64.118.110
                                            KuPBIsrqbO.exeGet hashmaliciousBrowse
                                            • 186.64.118.110
                                            1D1PBttduH.exeGet hashmaliciousBrowse
                                            • 186.64.118.110

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO #R58490.exe.log
                                            Process:C:\Users\user\Desktop\PO #R58490.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1314
                                            Entropy (8bit):5.350128552078965
                                            Encrypted:false
                                            SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                            MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                            SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                            SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                            SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                            C:\Windows\System32\drivers\etc\hosts
                                            Process:C:\Users\user\Desktop\PO #R58490.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):11
                                            Entropy (8bit):2.663532754804255
                                            Encrypted:false
                                            SSDEEP:3:iLE:iLE
                                            MD5:B24D295C1F84ECBFB566103374FB91C5
                                            SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                            SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                            SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview: ..127.0.0.1

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.516884488799235
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                            File name:PO #R58490.exe
                                            File size:966656
                                            MD5:5cff42958cd317e239d575732f7f9114
                                            SHA1:dec2ad475f2989f5096e02e00b45b265dd10c8c0
                                            SHA256:8636a1af1afb3fa83c218cbc4a18f37782b835d4ab8b27148d6f99cb849453a3
                                            SHA512:43cde418b8aa6d0626eb861e980bdeab3b82f472ac56b1e5aaa43f676e7203ecedd1f48813168f82a08aec7665e1fd04fb59586ea32b1679188a572a70c3b11c
                                            SSDEEP:12288:j4ZHNvC3A163SoAPBsFHDEp4rcVyfab52ZM4e/ZUdtb:jKHNvGAoxFHDEMY92NeBUdt
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.............................2... ...@....@.. .......................@............@................................

                                            File Icon

                                            Icon Hash:8c8caa8e9692aa00

                                            Static PE Info

                                            General

                                            Entrypoint:0x4c32fe
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x60C28A90 [Thu Jun 10 21:56:32 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                            Entrypoint Preview

                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc32b00x4b.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x2a380.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xc325f0x1c.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xc13040xc1400False0.897549371362data7.85720013511IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .sdata0xc40000x1e80x200False0.861328125data6.62101963076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                            .rsrc0xc60000x2a3800x2a400False0.12430658284data4.17130427114IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xf20000xc0x200False0.041015625data0.0776331623432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0xc62b00x2326PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                            RT_ICON0xc85d80x10828dBase III DBT, version number 0, next free block index 40
                                            RT_ICON0xd8e000x94a8data
                                            RT_ICON0xe22a80x5488data
                                            RT_ICON0xe77300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                            RT_ICON0xeb9580x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                            RT_ICON0xedf000x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                            RT_ICON0xeefa80x988data
                                            RT_ICON0xef9300x468GLS_BINARY_LSB_FIRST
                                            RT_GROUP_ICON0xefd980x84data
                                            RT_VERSION0xefe1c0x378data
                                            RT_MANIFEST0xf01940x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                            Imports

                                            DLLImport
                                            mscoree.dll_CorExeMain

                                            Version Infos

                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightPaul Harris 2016
                                            Assembly Version251.2.0.0
                                            InternalNameMessageData.exe
                                            FileVersion251.2.0.0
                                            CompanyNamePaul Harris
                                            LegalTrademarks
                                            Comments1992 Alpine A 610
                                            ProductNameReloadManager
                                            ProductVersion251.2.0.0
                                            FileDescriptionReloadManager
                                            OriginalFilenameMessageData.exe

                                            Network Behavior

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 11, 2021 12:49:57.175571918 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:57.441533089 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:57.441771030 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:57.825237989 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:57.826041937 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.092140913 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.092753887 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.362252951 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.413614988 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.438481092 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.715214014 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.715286970 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.715328932 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.715358019 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.715523005 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.715586901 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.717282057 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:58.731540918 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:58.999080896 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:59.054274082 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:59.267050028 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:59.532957077 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:59.535383940 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:49:59.804044962 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:49:59.805532932 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.077012062 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:00.078165054 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.345362902 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:00.346252918 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.613869905 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:00.616465092 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.882376909 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:00.889287949 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.889719963 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.889980078 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:00.890233994 CEST49739587192.168.2.3186.64.116.165
                                            Jun 11, 2021 12:50:01.163569927 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:01.163609028 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:01.163629055 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:01.163767099 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:01.168571949 CEST58749739186.64.116.165192.168.2.3
                                            Jun 11, 2021 12:50:01.210715055 CEST49739587192.168.2.3186.64.116.165

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 11, 2021 12:48:03.865456104 CEST6015253192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:03.927098989 CEST53601528.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:04.362371922 CEST5754453192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:04.412439108 CEST53575448.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:05.490386963 CEST5598453192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:05.540380955 CEST53559848.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:06.593909979 CEST6418553192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:06.643948078 CEST53641858.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:07.930582047 CEST6511053192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:07.991899014 CEST53651108.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:09.437484980 CEST5836153192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:09.487715006 CEST53583618.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:10.338879108 CEST6349253192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:10.391993999 CEST53634928.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:11.536705017 CEST6083153192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:11.589678049 CEST53608318.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:12.472227097 CEST6010053192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:12.525196075 CEST53601008.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:13.707720995 CEST5319553192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:13.759587049 CEST53531958.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:15.591284990 CEST5014153192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:15.641803026 CEST53501418.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:16.660744905 CEST5302353192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:16.711559057 CEST53530238.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:17.742645979 CEST4956353192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:17.795258045 CEST53495638.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:18.991339922 CEST5135253192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:19.041392088 CEST53513528.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:19.908243895 CEST5934953192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:19.958285093 CEST53593498.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:21.174634933 CEST5708453192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:21.233032942 CEST53570848.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:22.188071012 CEST5882353192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:22.238146067 CEST53588238.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:23.282547951 CEST5756853192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:23.333353996 CEST53575688.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:24.531217098 CEST5054053192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:24.584043026 CEST53505408.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:38.599397898 CEST5436653192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:38.658766985 CEST53543668.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:40.849282026 CEST5303453192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:40.910813093 CEST53530348.8.8.8192.168.2.3
                                            Jun 11, 2021 12:48:59.011162043 CEST5776253192.168.2.38.8.8.8
                                            Jun 11, 2021 12:48:59.084970951 CEST53577628.8.8.8192.168.2.3
                                            Jun 11, 2021 12:49:15.417186022 CEST5543553192.168.2.38.8.8.8
                                            Jun 11, 2021 12:49:15.492758989 CEST53554358.8.8.8192.168.2.3
                                            Jun 11, 2021 12:49:20.784035921 CEST5071353192.168.2.38.8.8.8
                                            Jun 11, 2021 12:49:20.844971895 CEST53507138.8.8.8192.168.2.3
                                            Jun 11, 2021 12:49:51.665713072 CEST5613253192.168.2.38.8.8.8
                                            Jun 11, 2021 12:49:51.726845026 CEST53561328.8.8.8192.168.2.3
                                            Jun 11, 2021 12:49:53.879087925 CEST5898753192.168.2.38.8.8.8
                                            Jun 11, 2021 12:49:53.949002981 CEST53589878.8.8.8192.168.2.3
                                            Jun 11, 2021 12:49:56.910500050 CEST5657953192.168.2.38.8.8.8
                                            Jun 11, 2021 12:49:57.063219070 CEST53565798.8.8.8192.168.2.3

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Jun 11, 2021 12:49:56.910500050 CEST192.168.2.38.8.8.80x8c7Standard query (0)mail.cavilum.clA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Jun 11, 2021 12:49:57.063219070 CEST8.8.8.8192.168.2.30x8c7No error (0)mail.cavilum.cl186.64.116.165A (IP address)IN (0x0001)

                                            SMTP Packets

                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Jun 11, 2021 12:49:57.825237989 CEST58749739186.64.116.165192.168.2.3220-blue125.dnsmisitio.net ESMTP Exim 4.93 #2 Fri, 11 Jun 2021 06:49:57 -0400
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jun 11, 2021 12:49:57.826041937 CEST49739587192.168.2.3186.64.116.165EHLO 980108
                                            Jun 11, 2021 12:49:58.092140913 CEST58749739186.64.116.165192.168.2.3250-blue125.dnsmisitio.net Hello 980108 [84.17.52.18]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jun 11, 2021 12:49:58.092753887 CEST49739587192.168.2.3186.64.116.165STARTTLS
                                            Jun 11, 2021 12:49:58.362252951 CEST58749739186.64.116.165192.168.2.3220 TLS go ahead

                                            Code Manipulations

                                            Statistics

                                            CPU Usage

                                            Click to jump to process

                                            Memory Usage

                                            Click to jump to process

                                            High Level Behavior Distribution

                                            Click to dive into process behavior distribution

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:12:48:10
                                            Start date:11/06/2021
                                            Path:C:\Users\user\Desktop\PO #R58490.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\PO #R58490.exe'
                                            Imagebase:0x830000
                                            File size:966656 bytes
                                            MD5 hash:5CFF42958CD317E239D575732F7F9114
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.214163603.0000000003BB9000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.213317019.0000000002BEF000.00000004.00000001.sdmp, Author: Joe Security
                                            Reputation:low

                                            General

                                            Start time:12:48:14
                                            Start date:11/06/2021
                                            Path:C:\Users\user\Desktop\PO #R58490.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Users\user\Desktop\PO #R58490.exe
                                            Imagebase:0x2c0000
                                            File size:966656 bytes
                                            MD5 hash:5CFF42958CD317E239D575732F7F9114
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low

                                            General

                                            Start time:12:48:15
                                            Start date:11/06/2021
                                            Path:C:\Users\user\Desktop\PO #R58490.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\PO #R58490.exe
                                            Imagebase:0x640000
                                            File size:966656 bytes
                                            MD5 hash:5CFF42958CD317E239D575732F7F9114
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.211277551.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.469305003.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.474545404.0000000002AE1000.00000004.00000001.sdmp, Author: Joe Security
                                            Reputation:low

                                            Disassembly

                                            Code Analysis

                                            Reset < >

                                              Executed Functions

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID: po$po
                                              • API String ID: 0-1814803154
                                              • Opcode ID: b5b627f07c090b9a89c86557ce279e863e60a083e6014e8e93bb328531cd7ed1
                                              • Instruction ID: 77dfe4e2b9adc878ab50190bc747a376759f289b301b59720ca707e5e8d81042
                                              • Opcode Fuzzy Hash: b5b627f07c090b9a89c86557ce279e863e60a083e6014e8e93bb328531cd7ed1
                                              • Instruction Fuzzy Hash: 66328A707012059FDB19EF69C850BAEB7F6EF88304F1484A9D68A9B390DB36ED05CB50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db7c44c650af56e2ce2e3597cad302ef39e697b373e20d2b8e0378000ba3f2e0
                                              • Instruction ID: 8f4bf0d3256120e19696b7a55a16633ae30b9e11a52ca78aac1d34e94b1d38c0
                                              • Opcode Fuzzy Hash: db7c44c650af56e2ce2e3597cad302ef39e697b373e20d2b8e0378000ba3f2e0
                                              • Instruction Fuzzy Hash: 3E312775D05218CFDB08DFB4D9487EDBAB0AF09301F1454AAE949B3280D73A6949DF54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a79eff2da324559aaaf34884f377a2b43397546b66bd5dbbd8f8ac8118101fa6
                                              • Instruction ID: fb76f40a7acf2b1cb4b01d2a389764cb0d624c278b2b5a1dbe4a6ad6ed54ce60
                                              • Opcode Fuzzy Hash: a79eff2da324559aaaf34884f377a2b43397546b66bd5dbbd8f8ac8118101fa6
                                              • Instruction Fuzzy Hash: 8E313871E05218CFDB08CFB5D848BEDBAF0AF09300F1054AAE909B3280D7766989DF14
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0108C2A6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID: po$po
                                              • API String ID: 4139908857-1814803154
                                              • Opcode ID: dd418155b4f9e91154dd03d01bba669afdad40fdfb8dbd825202c9be8a1b7086
                                              • Instruction ID: dd664746e7e535a69327b57c6fd2864b80214a6315cdad12463b91e7323435fe
                                              • Opcode Fuzzy Hash: dd418155b4f9e91154dd03d01bba669afdad40fdfb8dbd825202c9be8a1b7086
                                              • Instruction Fuzzy Hash: 347137B0A04B058FEB64DF69D58179ABBF1BF88204F00896ED58ADBB41D734E845CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0108E22A
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: e4d7d612a35c0ba4dbf90bbfb4f1d65d81238172b5326782ab6a3977e90cbca3
                                              • Instruction ID: 81a57361316918b150d7a2670b26052f31ba951095bf4641add770ba9faa6041
                                              • Opcode Fuzzy Hash: e4d7d612a35c0ba4dbf90bbfb4f1d65d81238172b5326782ab6a3977e90cbca3
                                              • Instruction Fuzzy Hash: 255110B1C04249AFDF12CFA9D880ADEBFB1BF49314F19816AE848AB221D7349855CF50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0108E22A
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: e11533504cb10e9b85a1f7bc0b06527c168a9782a594dd16ae8b0471d629b2e7
                                              • Instruction ID: 4530f4167f4531ea4b3b5a84b4c02cdaa1dfa29a0d0094f290ab65d08ef090ad
                                              • Opcode Fuzzy Hash: e11533504cb10e9b85a1f7bc0b06527c168a9782a594dd16ae8b0471d629b2e7
                                              • Instruction Fuzzy Hash: 8451AEB1D043099FDF14DF9AD884ADEFBB5BF48314F24822AE859AB210D7749945CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010876F7
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 32168eaa2dfad1315b0029024fc43b4d3c09239c9f619215b357ce9d6d76c5b4
                                              • Instruction ID: 3f75768f1619e3fc1e20cd6e09934d2c01fce1c644afd3bd110d6bba281931d8
                                              • Opcode Fuzzy Hash: 32168eaa2dfad1315b0029024fc43b4d3c09239c9f619215b357ce9d6d76c5b4
                                              • Instruction Fuzzy Hash: AF21F2B59002499FDB00CFAAE484ADEFFF8FB48324F14801AE954A3210D778A954CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0108C321,00000800,00000000,00000000), ref: 0108C532
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 6709ba1f45c58f2d086cdc0347305dbe95b83a4d4f45a4482bd30d0768a4603f
                                              • Instruction ID: a0c7f4e35193bb514d7ee699f994223a138dbb45d4b7aeaf2565152ad532f880
                                              • Opcode Fuzzy Hash: 6709ba1f45c58f2d086cdc0347305dbe95b83a4d4f45a4482bd30d0768a4603f
                                              • Instruction Fuzzy Hash: 5F2157B68043498FDB10DFAAD444ADEFBF4EF88314F04845AD559A7610D374A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010876F7
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 35b757ff78b806eb6402f819bfbdd5335a4a7f8160a5793d8c6c904babe0dd0d
                                              • Instruction ID: fd8cde9beea14a0fca70456c139f714e1da10f70a2a80cf85ab8c75e98fd45d7
                                              • Opcode Fuzzy Hash: 35b757ff78b806eb6402f819bfbdd5335a4a7f8160a5793d8c6c904babe0dd0d
                                              • Instruction Fuzzy Hash: D321C2B5900249DFDB10CFAAD984ADEFBF8FB48324F14841AE954A7310D774A954CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0108C321,00000800,00000000,00000000), ref: 0108C532
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 5ab650febfb1e22ceff9f1e5b3af45498f2f2613c04a8cc12540bf727841edfc
                                              • Instruction ID: b31a8f7e96594c7087dfe635ac4a8b570d87f2512ce54fa7be539148577382ee
                                              • Opcode Fuzzy Hash: 5ab650febfb1e22ceff9f1e5b3af45498f2f2613c04a8cc12540bf727841edfc
                                              • Instruction Fuzzy Hash: A21114B69042098FDB10DF9AD544BDEFBF4EB88314F04842AD559A7600D774A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0108C321,00000800,00000000,00000000), ref: 0108C532
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 618ec32db3f6724f2f81467dd42a5ab936d93c8a6666fb9a6fe8e7fcbc205c0f
                                              • Instruction ID: bd8836978324db790aff38c963fd339039c62aa1ba5772e4f70dc6bdb92be461
                                              • Opcode Fuzzy Hash: 618ec32db3f6724f2f81467dd42a5ab936d93c8a6666fb9a6fe8e7fcbc205c0f
                                              • Instruction Fuzzy Hash: 4C1144B28042488FDB10CF9AD444ADEFBF4AB88320F04842AE555A7600D374A546CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 04BF1B05
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: b03f259d2d9000b80d7676baaacece107fab96c5fafde84282d22a94df56aa69
                                              • Instruction ID: 23ef4df4894ed95e041bef5ea5dada513966f71decc6820e0694642149421ef6
                                              • Opcode Fuzzy Hash: b03f259d2d9000b80d7676baaacece107fab96c5fafde84282d22a94df56aa69
                                              • Instruction Fuzzy Hash: FC11F2B5800249DFDB10CF9AD985BDEFBF8EB48324F148459E958A7200D774A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0108C2A6
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 298c74786faddabada3b809f773700b5f1eb15cfb6b96d3f96929a91f3dfa7a5
                                              • Instruction ID: a2bd45a8356346e5b4c7ee01016b417903128998c07115140c3b7a557f7f7786
                                              • Opcode Fuzzy Hash: 298c74786faddabada3b809f773700b5f1eb15cfb6b96d3f96929a91f3dfa7a5
                                              • Instruction Fuzzy Hash: F2110FB1C006098FDB10DF9AD544ADEFBF4EB88224F14856AD869A7600D374A946CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 0108E7C5
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: 2dad8cfc6349d5c7fce730460580a9792d4d20a278a59b48924968c942d2a151
                                              • Instruction ID: 880efffcf211131d81d34e0dee91b1be988c65faa5cf71c2c111f2700988f89e
                                              • Opcode Fuzzy Hash: 2dad8cfc6349d5c7fce730460580a9792d4d20a278a59b48924968c942d2a151
                                              • Instruction Fuzzy Hash: 5411F2B59002499FDB10DF9AD488BDEFFF8EB48324F14845AE954A7600D374A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 04BF1B05
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: b61f5202bf5684b9daaa06ad1c136eea1db3fccffa246badafeb3fad42c9c915
                                              • Instruction ID: f99c72587b51b9e5e2e0c007b479f4b49cfae77bfec02700fe3a7cd61dad8540
                                              • Opcode Fuzzy Hash: b61f5202bf5684b9daaa06ad1c136eea1db3fccffa246badafeb3fad42c9c915
                                              • Instruction Fuzzy Hash: 5C11D0B5900349DFDB10CF9AD984BDEFBF8EB48324F14885AE558A7601D374A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 0108E7C5
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: b61d36733b50e7e885f11ec9f3e50da02136c385432fcc51057f88031e18780c
                                              • Instruction ID: 2a774d538499723fe92a59cec8869ae55adf1e399be7390b72093d0fb541b85d
                                              • Opcode Fuzzy Hash: b61d36733b50e7e885f11ec9f3e50da02136c385432fcc51057f88031e18780c
                                              • Instruction Fuzzy Hash: 0B1100B59002098FDB10DF9AD884BDEFBF8EB88324F10845AD958A7700D374A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Non-executed Functions

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 12dbc98949f4f53c9ca24aba4ece4551a40cd88341dae21817034952b6e4dba9
                                              • Instruction ID: 9ac404ef97a8bb1c47b673a0095c56a443b993df95916d2b62613cd762cec17f
                                              • Opcode Fuzzy Hash: 12dbc98949f4f53c9ca24aba4ece4551a40cd88341dae21817034952b6e4dba9
                                              • Instruction Fuzzy Hash: EE5257B1620B068BDB10CF14ED8A19D7FF1FB51328F904218E5A15FA99DBB8654BCF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.213156402.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 659095cc1ad5538598c3808c8028fab10621e115c21bb23afd638e7a3ff1ad54
                                              • Instruction ID: 6e8307494a723083d8f77404cf56cc5899083b185343d13a9ff09cd50dba4685
                                              • Opcode Fuzzy Hash: 659095cc1ad5538598c3808c8028fab10621e115c21bb23afd638e7a3ff1ad54
                                              • Instruction Fuzzy Hash: 44A18032E1061ACFCF05EFA5C8445DEBBF2FF84300B15856AE985BB261DB75A945CB80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4ab984776e2d383f2460c95dcc1936dac3b9e528cbbe32699d298eb5985715dd
                                              • Instruction ID: b7dff07e740a7d20fd9772afa66c5c61820586e127340351a0e079650ba397d3
                                              • Opcode Fuzzy Hash: 4ab984776e2d383f2460c95dcc1936dac3b9e528cbbe32699d298eb5985715dd
                                              • Instruction Fuzzy Hash: 4E612A71E04629CBDB68CF6ACC40799FBB6BBC9300F14D5EAD50DA6214EB345A85CF40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 989e64dad451e25a74f32483086c456834ce13405975942064901ba972b02808
                                              • Instruction ID: df24718250676bc6bd2ce50a33fbb54c980906d1cdde66dbfdd641417809a765
                                              • Opcode Fuzzy Hash: 989e64dad451e25a74f32483086c456834ce13405975942064901ba972b02808
                                              • Instruction Fuzzy Hash: 7B51E571E00669CBDB68CF6ACC4479AFBB2BBC9300F14C5EA950DA7214EB345A85CF54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e608fc1f8f546d0356945671e1567b2571c62fb3762ddab5007629d12b8be05d
                                              • Instruction ID: 8437b5aa64c36c739d5dce84a9403041dcb300df9d48c2562855e04d8282daf4
                                              • Opcode Fuzzy Hash: e608fc1f8f546d0356945671e1567b2571c62fb3762ddab5007629d12b8be05d
                                              • Instruction Fuzzy Hash: 56510774E0066ACBCB64CF65CC44B9DBBB2BB89301F1099EAD50DA7214E7345E99CF44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7abf59a1b104f7b66aeb1197ab1c1fc9030e00e075c1bb2f74623310c971f440
                                              • Instruction ID: 8a735997dbe52f768ee2bfc6f25ac6e00e594ef15e4f853754c953d7405bf632
                                              • Opcode Fuzzy Hash: 7abf59a1b104f7b66aeb1197ab1c1fc9030e00e075c1bb2f74623310c971f440
                                              • Instruction Fuzzy Hash: 51410770E4066ACADB64CF65CC40B99B7B2BB89300F10DAEAD50DB2614E7345AD98F54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 378902a59a616f4b0a964985b9110eee54d71e14c4e75f63ea28c01b09486fca
                                              • Instruction ID: a00a7cfbd49fd377070a13d06a9eca3fb68f0c393e83b90f088ae8db6ef713a2
                                              • Opcode Fuzzy Hash: 378902a59a616f4b0a964985b9110eee54d71e14c4e75f63ea28c01b09486fca
                                              • Instruction Fuzzy Hash: 36314B70E09218DFDB14CFA9D848BEDBAF1BF49301F04A0A9E909B7250D735A948CB14
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.215041485.0000000004BF0000.00000040.00000001.sdmp, Offset: 04BF0000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e910191599834eed83f027c799e3c5f6c003a1efe84f0aec2befd4822c12905a
                                              • Instruction ID: 4f712836380eb1d24d2a0063a7129a098afbbca9f47b3f23a2cef37e20484a44
                                              • Opcode Fuzzy Hash: e910191599834eed83f027c799e3c5f6c003a1efe84f0aec2befd4822c12905a
                                              • Instruction Fuzzy Hash: F9317A70E092189FDB00CFA4D9547EDBBF0BB4A301F0060A9E909B7380D735A948DB14
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Executed Functions

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.470825799.0000000000B50000.00000040.00000001.sdmp, Offset: 00B50000, based on PE: false
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: d9c102ca3775cb007a370422668be0c5c25d56e98a9a5ae8343c9741531e08d4
                                              • Instruction ID: e61a595d66512ca17c5568f3919b83608e9746eb2532ba8923a4971132b89188
                                              • Opcode Fuzzy Hash: d9c102ca3775cb007a370422668be0c5c25d56e98a9a5ae8343c9741531e08d4
                                              • Instruction Fuzzy Hash: AB62F975E006188FDB24EF78C8547ADB7F1AF89304F1486A9D54AAB750EF30AE85CB41
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E70B36
                                              • LdrInitializeThunk.NTDLL ref: 00E70CD5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionInitializeThunkUser
                                              • String ID:
                                              • API String ID: 243558500-0
                                              • Opcode ID: e51dd8775597822ecc0dd4dbaa9fc55bfd245b1904963a985a2072aceee40a89
                                              • Instruction ID: 0ac81aafbb32213927e3fbaf5fc10a10ca758f941b9792284e644a8a6a9e4364
                                              • Opcode Fuzzy Hash: e51dd8775597822ecc0dd4dbaa9fc55bfd245b1904963a985a2072aceee40a89
                                              • Instruction Fuzzy Hash: 23A20474A14228CFCB64EF34D9987ADBBB6BB48305F2085EAD509A3350DB349E85CF51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E70B36
                                              • LdrInitializeThunk.NTDLL ref: 00E70CD5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionInitializeThunkUser
                                              • String ID:
                                              • API String ID: 243558500-0
                                              • Opcode ID: 1831547fd378ace8f7c8a2953bcb42e79c5d0ca5b7101c710c58e5b2109f7f79
                                              • Instruction ID: eda2dc8619e217a75b1cac30d993e4571529d7c185fcdb1d0d108f12957d4f6e
                                              • Opcode Fuzzy Hash: 1831547fd378ace8f7c8a2953bcb42e79c5d0ca5b7101c710c58e5b2109f7f79
                                              • Instruction Fuzzy Hash: BB5203B4A15228CFCB64DF34D8887ADBBB6BB48305F2085EAD509A3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E70B36
                                              • LdrInitializeThunk.NTDLL ref: 00E70CD5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionInitializeThunkUser
                                              • String ID:
                                              • API String ID: 243558500-0
                                              • Opcode ID: ea21b023f276480f7655b797c9495333bb739862fa0fe8f55603b87eed50a3f7
                                              • Instruction ID: 7359fbb411644c80f92295fe7d5e02f0c4468584212b7ed91810b0077b68c103
                                              • Opcode Fuzzy Hash: ea21b023f276480f7655b797c9495333bb739862fa0fe8f55603b87eed50a3f7
                                              • Instruction Fuzzy Hash: 855203B4A15228CFCB64DF34D8887ADBBB6AF48305F2085EAD509A3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E70B36
                                              • LdrInitializeThunk.NTDLL ref: 00E70CD5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionInitializeThunkUser
                                              • String ID:
                                              • API String ID: 243558500-0
                                              • Opcode ID: 70b0a889711f6e1c7c43ef0f5111b9102f8a6d90bf5956fb569a8791933231ce
                                              • Instruction ID: 15d74b33eb2981f78e9d4b7acbfe0772365136ef813490e22a4ee089f94f154b
                                              • Opcode Fuzzy Hash: 70b0a889711f6e1c7c43ef0f5111b9102f8a6d90bf5956fb569a8791933231ce
                                              • Instruction Fuzzy Hash: FE5203B4A15228CFCB64DF34D8887ADBBB6AF48305F2085EAD509A3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: f38a8fcb5d6841f9460806b6d1cd9cf0b4d07d5e3ed3b724a6ff0e633841ba9f
                                              • Instruction ID: 5becbd1ffb77d74777f062d5bcd13c03e4bfb3d076ecdda0eb69e582de294287
                                              • Opcode Fuzzy Hash: f38a8fcb5d6841f9460806b6d1cd9cf0b4d07d5e3ed3b724a6ff0e633841ba9f
                                              • Instruction Fuzzy Hash: C9520474A15228CFCB64DF34D8887ADBBB6AB48305F2085EAD509A3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 2b84b123cd67b08d7b04d59dd7de7d01fed2a4b1724f7eeeb8af5d0667d60c09
                                              • Instruction ID: 5b91e31abc05a967c5d03ee1da28711bad3afb23425edd5803a72db2e4c3de0a
                                              • Opcode Fuzzy Hash: 2b84b123cd67b08d7b04d59dd7de7d01fed2a4b1724f7eeeb8af5d0667d60c09
                                              • Instruction Fuzzy Hash: F65203B4A15228CFCB64DF34D8887ADBBB6BB48305F2085EAD509A3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 02bf021fcc00b29630ebc9bdc088a4c026a1a32fadcbd6520f11145c7eb2af60
                                              • Instruction ID: f83c7ff16ff55b28d2cbcb2a961f4da505783340230e446f17aaa1c8506d47a9
                                              • Opcode Fuzzy Hash: 02bf021fcc00b29630ebc9bdc088a4c026a1a32fadcbd6520f11145c7eb2af60
                                              • Instruction Fuzzy Hash: 8022F674A15228CFCB65DF38D884698B7B6BF49306F2080EED60DA2350DB359E86CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: d885a580c57302d32d116aadcf6a0cf8f97de4c970dfe3469b93c123e9ba1be3
                                              • Instruction ID: 1773deece415622540729e3224c1b5ea3e7e5e85f67efe12f920ead715882e0b
                                              • Opcode Fuzzy Hash: d885a580c57302d32d116aadcf6a0cf8f97de4c970dfe3469b93c123e9ba1be3
                                              • Instruction Fuzzy Hash: 34220674A15228CFCB65DF38D884698B7B6BF49306F2080EED60DA2350DB359E86CF15
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: b1a5d4f946cb20b44227fda260f1c5e5525585c20c4e58cb1c14b7512fd41c86
                                              • Instruction ID: 1cac37157823a13dcb1ae1307f4e9000a78619697f4e71c6e96689c98c1ce53c
                                              • Opcode Fuzzy Hash: b1a5d4f946cb20b44227fda260f1c5e5525585c20c4e58cb1c14b7512fd41c86
                                              • Instruction Fuzzy Hash: 1812F674A15228CFCB65DF34D984698B7B6BF48306F2080EED60DA2350DB359E86CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 4d944c2cd0fff82ae9f5a238ee3f7bea42816ba92b2b8a765a04b3a1ec39d773
                                              • Instruction ID: 239f0fc26dc7d925e6a92107ceb7377cba165c470978057515a33223272110c1
                                              • Opcode Fuzzy Hash: 4d944c2cd0fff82ae9f5a238ee3f7bea42816ba92b2b8a765a04b3a1ec39d773
                                              • Instruction Fuzzy Hash: 0B12F6B4A15228CFCB65DF38D884698B7B6BF48306F2081EED60DA2350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 89dd5e0d395995c71070b9c6e43d40f1766dce1291daf89c44ae7e1574e2491d
                                              • Instruction ID: e5757cc914e27403b7255753d6c8ee53df9603c55af8b19f51b9e036d286e7b5
                                              • Opcode Fuzzy Hash: 89dd5e0d395995c71070b9c6e43d40f1766dce1291daf89c44ae7e1574e2491d
                                              • Instruction Fuzzy Hash: 1512F6B4A15228CFCB65DF38D884698B7B6BB48306F2081EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: ad2fcc90c52e3edbb9d036a8c15ede94d54b7a5c6ce87d5bf4d7ea2db3efc55c
                                              • Instruction ID: a8d937d5baf695664ec306b0c2c9f2ecfe1a0110687191aefebd3e79fd169a9b
                                              • Opcode Fuzzy Hash: ad2fcc90c52e3edbb9d036a8c15ede94d54b7a5c6ce87d5bf4d7ea2db3efc55c
                                              • Instruction Fuzzy Hash: 8312F6B4A15228CFCB65DF38D884698B7B6BB48305F2081EED60DA3350DB359E86CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 99f21f45110112449f092d686bd6ea9f079b247510bf6287c1e578b9819f8bca
                                              • Instruction ID: bc5962a4df9efabc80b169819dff053ca2e600e9adf6745dabffe7efb1a0f616
                                              • Opcode Fuzzy Hash: 99f21f45110112449f092d686bd6ea9f079b247510bf6287c1e578b9819f8bca
                                              • Instruction Fuzzy Hash: 8712F7B4A15228CFCB65DF38D984698B7B6BB48305F2080EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 2ee1130a5562d65150d534c77a139c6d7fb63dbc058d5cf9d49cef8806b03d6e
                                              • Instruction ID: ee1b990785dd4b0c8e63f5c23ec08736d24999539c37f7f13f296b2375f0ce0b
                                              • Opcode Fuzzy Hash: 2ee1130a5562d65150d534c77a139c6d7fb63dbc058d5cf9d49cef8806b03d6e
                                              • Instruction Fuzzy Hash: 5C02F7B4A15228CFCB64DF38D884698B7B6BB48305F2081EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 38312bbdc9b5117ab22bfb62ec3e6186d325ff727a5d91940ec4960305761e09
                                              • Instruction ID: ad39b3485674ed5de61e2192d4ecf45bdb747ef42c435379a97a028a4787360b
                                              • Opcode Fuzzy Hash: 38312bbdc9b5117ab22bfb62ec3e6186d325ff727a5d91940ec4960305761e09
                                              • Instruction Fuzzy Hash: 6002F7B4A15228CFCB64DF38D884698B7B6BB48305F2085EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: f130c3238193f972957eb3f138f001e27b66a72f8a9a41f9baada19b0a2f23b1
                                              • Instruction ID: 683f234dfec9e21bd33e68daaa9998b2c3b939a0230a04b0484de659e58346c9
                                              • Opcode Fuzzy Hash: f130c3238193f972957eb3f138f001e27b66a72f8a9a41f9baada19b0a2f23b1
                                              • Instruction Fuzzy Hash: D402F6B4A15228CFCB64DF38D884698B7B6BB48305F2085EED60DA3350DB359E86CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: fc58e32f73ba9703ceb6d28cb8316f22debffece282de6b8f88351829ac866cb
                                              • Instruction ID: 1693baf0ce7501e6b52a1882fc172df356e416123849e5138657eb80cc540556
                                              • Opcode Fuzzy Hash: fc58e32f73ba9703ceb6d28cb8316f22debffece282de6b8f88351829ac866cb
                                              • Instruction Fuzzy Hash: CD0207B4A15229CFCB64DF38D884698B7B6AB48305F2080EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 5b2defd262148cc4f5292b2c0fc068bf0c5b8d96405b1803d1c0668e05a088a6
                                              • Instruction ID: 993aeb8fe6588098ff0077a99b4208a79e4acbe711b25a7461c0fe361c8b0503
                                              • Opcode Fuzzy Hash: 5b2defd262148cc4f5292b2c0fc068bf0c5b8d96405b1803d1c0668e05a088a6
                                              • Instruction Fuzzy Hash: F40207B4A15229CFCB64DF38D884698B7B6BB48305F2085EED60DA3350DB349E86CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: a5731e86f48d3a3e26c2da7eeea5666f03e40ed05b9d40fa094ba69f20c2b905
                                              • Instruction ID: d21fe1ebb4cf0bccc933fdc41e388615d009edad927ea72db4f35316fe1c8e51
                                              • Opcode Fuzzy Hash: a5731e86f48d3a3e26c2da7eeea5666f03e40ed05b9d40fa094ba69f20c2b905
                                              • Instruction Fuzzy Hash: AAF107B4A15229CFCB64DF34D8847A8B7B6AB88305F2084EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: d1779fcbd37b18aaab46238e8b55b34ea8839bb3a04ab3c309f60380a501fe20
                                              • Instruction ID: 744c285c91671167f82900a1768ead9b5d862c74eedd1f5f50f1a7e04fa3f8f9
                                              • Opcode Fuzzy Hash: d1779fcbd37b18aaab46238e8b55b34ea8839bb3a04ab3c309f60380a501fe20
                                              • Instruction Fuzzy Hash: 93F117B4A14229CFCB64DF34C8847A8B7B6AB88305F2085EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 9756fbfa1db0c89542ec7c352baf6b6c67ff2dd591d269f8ed6dfe5c089ff0dd
                                              • Instruction ID: 1f2d3fa0779c275944ba1c0176164a4d0b5be581253941f9bdcbd6095c2f3c34
                                              • Opcode Fuzzy Hash: 9756fbfa1db0c89542ec7c352baf6b6c67ff2dd591d269f8ed6dfe5c089ff0dd
                                              • Instruction Fuzzy Hash: BAF107B4A15229CFCB64DF34C9847A8B7B6AB88305F2084EED609A3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 8dd2bbda0234ce80537432763e75741ebb5fce52205fd6592c703015c9aba4da
                                              • Instruction ID: 8f2aa2408a2b352ee54f24bc0acc65bbb0d95b72773ccd64415d0f7fdd397659
                                              • Opcode Fuzzy Hash: 8dd2bbda0234ce80537432763e75741ebb5fce52205fd6592c703015c9aba4da
                                              • Instruction Fuzzy Hash: 5CF107B4A14229CFCB64DF34C8847ACB7B6AB88305F2085EED609A3340DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 2ce1efdde9e0ff718348f32945042a287fb534b11728388de966818d7f94a56e
                                              • Instruction ID: 6b2e54f99b7d247a129ef1301799ef42f83b84ab574e69d0241cf6d80e7fae86
                                              • Opcode Fuzzy Hash: 2ce1efdde9e0ff718348f32945042a287fb534b11728388de966818d7f94a56e
                                              • Instruction Fuzzy Hash: C0E107B4A15229CFCB64DB24C8947A8B7B6AB88305F2085EED609A3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 13bd90180d4ce89181e08a993950bef0b4ced12b923a7ab652e6d1e5df53f334
                                              • Instruction ID: de53a99212988e00abfb01c8bc882e760e756c99aa900b41dc1dd73103816d2d
                                              • Opcode Fuzzy Hash: 13bd90180d4ce89181e08a993950bef0b4ced12b923a7ab652e6d1e5df53f334
                                              • Instruction Fuzzy Hash: 95E108B4A14229CFCB64DB24C8947ACB7B6AB88305F2085EED60DA3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 976b897002f41cba195ea5ed951dbfae924ecc78a8ac37ea194b3b0880a78b53
                                              • Instruction ID: 70c5e66c0216f1518449c24d8d28fd664345068d90d10b998634662ec4ad5fa2
                                              • Opcode Fuzzy Hash: 976b897002f41cba195ea5ed951dbfae924ecc78a8ac37ea194b3b0880a78b53
                                              • Instruction Fuzzy Hash: C6E107B4A14229CFCB64DF24C9947ADB7B6AB88305F2084EED60DA3340DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 9e845f0b20bdde577d8bcc24b58bcbbc2f96a4daf0489243aa4bdbbe957f8893
                                              • Instruction ID: 17db637ae597d8ab3a595523ab0c50bb62df3773878fafb0622cd87dee90e8f4
                                              • Opcode Fuzzy Hash: 9e845f0b20bdde577d8bcc24b58bcbbc2f96a4daf0489243aa4bdbbe957f8893
                                              • Instruction Fuzzy Hash: 94D107B4A14229CFCB64DF24C8947A9B7B6AB88305F2085EED60DA3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: acc198218fd6d714bed3b105500189c1a9c49571e2a4e96a377a981da6db244b
                                              • Instruction ID: 9dfdea18d0eeaa2588d5fee8b970fd74856add743e0370b2fb3b10e9fada91fe
                                              • Opcode Fuzzy Hash: acc198218fd6d714bed3b105500189c1a9c49571e2a4e96a377a981da6db244b
                                              • Instruction Fuzzy Hash: 43D109B4A15229CFCB64DF34C8847A9B7B6AB88305F2084EED60DA3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 09918a8f7b733f303dfc4d35fa962e31690b56963f96f29e3eff0279e2be4adf
                                              • Instruction ID: c4d5d9a2d9b1a3f64ccfd5ccafa9fe634f6f4ae15ad032fdb24aaecee8e545b5
                                              • Opcode Fuzzy Hash: 09918a8f7b733f303dfc4d35fa962e31690b56963f96f29e3eff0279e2be4adf
                                              • Instruction Fuzzy Hash: A6D108B4A14229CFCB64DF34C9847A9B7B6AB88305F2084EED60DA3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 33fa3eb1dc62bdb20253b1a0285ba53ff7ec1e5c6d6af44f5ccc0e55cc88eab7
                                              • Instruction ID: 13b884decfe0a3bf2d3c89f60abf01c979d344036aea4f77e7157d74f02468af
                                              • Opcode Fuzzy Hash: 33fa3eb1dc62bdb20253b1a0285ba53ff7ec1e5c6d6af44f5ccc0e55cc88eab7
                                              • Instruction Fuzzy Hash: FAD108B4A14229CFCB64DF34C9847A9B7B6AB88305F2084EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71640
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 020b03d05891fc5a0258a21ccbdc034b8181905f384eef058ec6cf433c6556b0
                                              • Instruction ID: 6a5847e7c8d886e377f775fd67b243c2e917e71f9803763fe67afea2ab51aad3
                                              • Opcode Fuzzy Hash: 020b03d05891fc5a0258a21ccbdc034b8181905f384eef058ec6cf433c6556b0
                                              • Instruction Fuzzy Hash: C9C107B4A14229CFCB64DB34C8947ADB7B6AB88305F2084EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473669845.0000000000F20000.00000040.00000001.sdmp, Offset: 00F20000, based on PE: false
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: f855f6b18dd05dbd16159dac9ab7b48873174395cdea3bffed5a33e1277dff49
                                              • Instruction ID: 1b8cd890e0b1e73959e065bfd49de1725f605544a01119b597b0e8fc9b340393
                                              • Opcode Fuzzy Hash: f855f6b18dd05dbd16159dac9ab7b48873174395cdea3bffed5a33e1277dff49
                                              • Instruction Fuzzy Hash: 1E12F330F042598FDB20DBA8E884BADB7B1EF45310F15896AE419DB391DB34EC45DB92
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 5246c2a0db171db4265788aa0a2898434d24eeefad126ab619f7bb43b47cfdc4
                                              • Instruction ID: a33692639df6087c25a724972e9e07828953543b7490b69b936314b4a885799b
                                              • Opcode Fuzzy Hash: 5246c2a0db171db4265788aa0a2898434d24eeefad126ab619f7bb43b47cfdc4
                                              • Instruction Fuzzy Hash: 43C108B4A15229CFCB64DB24C8947ADB7B2AF88305F2084EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 7365a6626caf9965b1fe9057ef9ec3efd69dfd07bd365595b8e1b2d721fdda48
                                              • Instruction ID: 245481a8d4432ca77719355c865a863fda929dd942f3bf4d183bdf5966b05667
                                              • Opcode Fuzzy Hash: 7365a6626caf9965b1fe9057ef9ec3efd69dfd07bd365595b8e1b2d721fdda48
                                              • Instruction Fuzzy Hash: ABB108B4A14229CFCB64DB24C8947ADB7B6AF88305F2084EED60DA3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 663399dbad3a641d3eeacd61b57066cfcf157bd11a85388ff39e1f4d2acb45b1
                                              • Instruction ID: f9a4cd464e538a385e95fcc0fbf369372490fb0867d841d9f6095ad30cfdb47c
                                              • Opcode Fuzzy Hash: 663399dbad3a641d3eeacd61b57066cfcf157bd11a85388ff39e1f4d2acb45b1
                                              • Instruction Fuzzy Hash: 2BB117B4A15229CFCB64DB24C8947ADB7B6AF88305F2084EED60DA3340DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 54c55cc2ae5a866aa781e42cc51c3a084ba0485e83bb89e0a66d2bf4bd92b581
                                              • Instruction ID: 396638038c7dfebb550fc961f712e352b1c6dd353cc23752a1c2c326edb2a695
                                              • Opcode Fuzzy Hash: 54c55cc2ae5a866aa781e42cc51c3a084ba0485e83bb89e0a66d2bf4bd92b581
                                              • Instruction Fuzzy Hash: 5BB107B4A14229CFCB64DB24C8947ADB7B6AF88305F2084EED60DA3350DB359E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 53faf00af54449e7f154a1609c4eca16e99221770dacd67038b0b0ffd2e1913b
                                              • Instruction ID: 3fc1bee16735211affdaee0a325b38e6de909c87195ccb346f0ec476abcbfc47
                                              • Opcode Fuzzy Hash: 53faf00af54449e7f154a1609c4eca16e99221770dacd67038b0b0ffd2e1913b
                                              • Instruction Fuzzy Hash: 06A108B4A152298FCB64DB34C8947ADB7B6AF88305F2084EED60DA3350DB349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL ref: 00E71806
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473540735.0000000000E70000.00000040.00000001.sdmp, Offset: 00E70000, based on PE: false
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: e992c66a781a449f24bd4a927b001829657c7a9eb2095d04fe6f72f7f7469249
                                              • Instruction ID: e2cdce210369d4f8bb73176e87a74032b577c8876d0ff36243b4f778ed55809a
                                              • Opcode Fuzzy Hash: e992c66a781a449f24bd4a927b001829657c7a9eb2095d04fe6f72f7f7469249
                                              • Instruction Fuzzy Hash: C3A108B4A152298FCB64DB34C8947ADB6B6AF88305F2084EED60DA3350DF349E85CF55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473669845.0000000000F20000.00000040.00000001.sdmp, Offset: 00F20000, based on PE: false
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: f341ea3be91a527a0b6e90fd510e5307180f7328a275450107d27a8a525076e5
                                              • Instruction ID: 8aa77bb241e1ac77ea0918bc699e5e5fff5a01a935cbcd4bf0cc77d75cb9492c
                                              • Opcode Fuzzy Hash: f341ea3be91a527a0b6e90fd510e5307180f7328a275450107d27a8a525076e5
                                              • Instruction Fuzzy Hash: 14614D34E102199BDB14EBB4E8597AEBBF2AF84304F208829E405E7390DF359C45DB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473701023.0000000000F30000.00000040.00000001.sdmp, Offset: 00F30000, based on PE: false
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d0d206a5cdb0541eb28d1f8dba6f1ff19c5bc073d2cd2f947b571f875d33f38b
                                              • Instruction ID: 78f1cc806c883f183fadcd692de5df2dbcaa9bde385d8a63ee251966f24acd62
                                              • Opcode Fuzzy Hash: d0d206a5cdb0541eb28d1f8dba6f1ff19c5bc073d2cd2f947b571f875d33f38b
                                              • Instruction Fuzzy Hash: CB412272E043598FCB00CFA9D8102DEBBF4EF89324F09856AD904E7240EB389945CBE1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00F31B63
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473701023.0000000000F30000.00000040.00000001.sdmp, Offset: 00F30000, based on PE: false
                                              Similarity
                                              • API ID: HookWindows
                                              • String ID:
                                              • API String ID: 2559412058-0
                                              • Opcode ID: 4dbf5bc5f070f974af3bc44a3344726a2b1d7adcb0d24f4fceb6ccdab6d31127
                                              • Instruction ID: 116408460fe9506d0d4e9729d62350ff478b2f1d6599a80e0d7a9bc0544fe810
                                              • Opcode Fuzzy Hash: 4dbf5bc5f070f974af3bc44a3344726a2b1d7adcb0d24f4fceb6ccdab6d31127
                                              • Instruction Fuzzy Hash: F121F3759042099FCB14CFA9D844BDEFBF5EB88324F14842AE415A7250DB74A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00F31B63
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473701023.0000000000F30000.00000040.00000001.sdmp, Offset: 00F30000, based on PE: false
                                              Similarity
                                              • API ID: HookWindows
                                              • String ID:
                                              • API String ID: 2559412058-0
                                              • Opcode ID: c3beff44fa2fabd4f62726e05a677f5e0cccbe465f568d829b02e233956c0ca2
                                              • Instruction ID: 507e6c7944b09112cf517e02b055f08ad8f880fa540d6a0015f0a274628e458a
                                              • Opcode Fuzzy Hash: c3beff44fa2fabd4f62726e05a677f5e0cccbe465f568d829b02e233956c0ca2
                                              • Instruction Fuzzy Hash: F4211575D002099FCB10CF99C844BDEFBF5FB88324F10842AD415A7250DB74A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 00F30B17
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473701023.0000000000F30000.00000040.00000001.sdmp, Offset: 00F30000, based on PE: false
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 529a7317d8d8c195e6b32f6d38aed6a281e4046753d475d0247b87570ac237fa
                                              • Instruction ID: 67b9e897c2ea60eb30572e8e55d85d9f6b2e5fa225d3ee9fe071cfa31aa9b956
                                              • Opcode Fuzzy Hash: 529a7317d8d8c195e6b32f6d38aed6a281e4046753d475d0247b87570ac237fa
                                              • Instruction Fuzzy Hash: 241103B1D006199BCB00CF9AC844BDEFBF8EF48324F15816AD818A7240D778A955CFE1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,00F3A629,00000800), ref: 00F3A6BA
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473701023.0000000000F30000.00000040.00000001.sdmp, Offset: 00F30000, based on PE: false
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 8a9d1c76b3f443d61388714bb49399c6ee031c95cfafc5114bfb9ea1fcaf3ed0
                                              • Instruction ID: 0bba471c5251f96d4428b385981dc542f48dfa3b649e9d59e30d480a4f83e91d
                                              • Opcode Fuzzy Hash: 8a9d1c76b3f443d61388714bb49399c6ee031c95cfafc5114bfb9ea1fcaf3ed0
                                              • Instruction Fuzzy Hash: 0C1114B6D002098FCB10CF9AC444BDEFBF4EB89360F14842ED955A7200C775A945CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,00F3A629,00000800), ref: 00F3A6BA
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.473701023.0000000000F30000.00000040.00000001.sdmp, Offset: 00F30000, based on PE: false
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: f29a21daeb114f44b919260c6feb8ca48dc5ce0495e3b4d8e47764c5b5889bf1
                                              • Instruction ID: e9f6f496efd608f49d2414103cf9059827e6399f12e2e5e0647a382d792ff2a4
                                              • Opcode Fuzzy Hash: f29a21daeb114f44b919260c6feb8ca48dc5ce0495e3b4d8e47764c5b5889bf1
                                              • Instruction Fuzzy Hash: D11114B6D002098FCB10DF9AC444BDEFBF4EB99320F15842ED955A7600C374A945CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Non-executed Functions