Loading ...

Play interactive tourEdit tour

Windows Analysis Report PI A19T010620.exe

Overview

General Information

Sample Name:PI A19T010620.exe
Analysis ID:458957
MD5:62aaab0942211b9d11a7755d1970adfd
SHA1:2703f7f409aeb01b0d68e83f336241f4b7923532
SHA256:23e9628689de5cffc14abcc1d39a259f54bde8e50304af29d4e127359163e1c4
Tags:exenull
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
.NET source code contains very large strings
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Process Start Without DLL
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • PI A19T010620.exe (PID: 7024 cmdline: 'C:\Users\user\Desktop\PI A19T010620.exe' MD5: 62AAAB0942211B9D11A7755D1970ADFD)
    • RegSvcs.exe (PID: 6464 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • NXLun.exe (PID: 7164 cmdline: 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • NXLun.exe (PID: 2432 cmdline: 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "compliance2@odessabd.com", "Password": "abc321", "Host": "mail.odessabd.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegSvcs.exe PID: 6464JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegSvcs.exe PID: 6464JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Suspicious Process Start Without DLLShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\PI A19T010620.exe' , ParentImage: C:\Users\user\Desktop\PI A19T010620.exe, ParentProcessId: 7024, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6464
                Sigma detected: Possible Applocker BypassShow sources
                Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\PI A19T010620.exe' , ParentImage: C:\Users\user\Desktop\PI A19T010620.exe, ParentProcessId: 7024, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6464

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "compliance2@odessabd.com", "Password": "abc321", "Host": "mail.odessabd.com"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: PI A19T010620.exeVirustotal: Detection: 51%Perma Link
                Source: PI A19T010620.exeMetadefender: Detection: 42%Perma Link
                Source: PI A19T010620.exeReversingLabs: Detection: 78%
                Machine Learning detection for sampleShow sources
                Source: PI A19T010620.exeJoe Sandbox ML: detected
                Source: 2.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: PI A19T010620.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: PI A19T010620.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: RegSvcs.pdb, source: NXLun.exe, 00000009.00000002.744648798.00000000001B2000.00000002.00020000.sdmp, NXLun.exe, 0000000D.00000002.761737974.0000000000AB2000.00000002.00020000.sdmp, NXLun.exe.2.dr
                Source: Binary string: RegSvcs.pdb source: NXLun.exe, NXLun.exe.2.dr
                Source: Joe Sandbox ViewIP Address: 192.185.90.36 192.185.90.36
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: unknownDNS traffic detected: queries for: mail.odessabd.com
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: RegSvcs.exe, 00000002.00000002.901604014.0000000002788000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901542292.000000000275D000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://P02rvktl5O.com
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.o_
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: RegSvcs.exe, 00000002.00000003.880396544.0000000005619000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft.co9
                Source: PI A19T010620.exeString found in binary or memory: http://i.imgur.com/blkrqBo.gifiThis
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://mOEDeY.com
                Source: RegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpString found in binary or memory: http://mail.odessabd.com
                Source: RegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpString found in binary or memory: http://odessabd.com
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: PI A19T010620.exe, 00000000.00000003.638876019.0000000001ADD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                Source: PI A19T010620.exeString found in binary or memory: https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072f
                Source: RegSvcs.exe, 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                Spam, unwanted Advertisements and Ransom Demands:

                barindex
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 2.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bD95BE525u002dE724u002d4092u002dAC05u002d1C2D15F5ED67u007d/CB5629C0u002dCF6Bu002d4547u002dA8F4u002d3F00408FA47B.csLarge array initialization: .cctor: array initializer size 11946
                .NET source code contains very large stringsShow sources
                Source: PI A19T010620.exe, UT1ISfP0HmUF7h5yru/aMxeoyTl2XtxGNHxhY.csLong String: Length: 10292
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006998222_2_00699822
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0069C1282_2_0069C128
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006905C82_2_006905C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00695ED02_2_00695ED0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_006973CC2_2_006973CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00702D502_2_00702D50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070D5002_2_0070D500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070AB782_2_0070AB78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00701FF02_2_00701FF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070CCB02_2_0070CCB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0070F3302_2_0070F330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_008202702_2_00820270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_008285E82_2_008285E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00824B982_2_00824B98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0082D1EA2_2_0082D1EA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_008253E02_2_008253E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0082533A2_2_0082533A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_022347A02_2_022347A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02233CCC2_2_02233CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_022346B02_2_022346B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_022354712_2_02235471
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                Source: PI A19T010620.exe, 00000000.00000000.634626091.000000000110A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCompletionActionInvok.exe2 vs PI A19T010620.exe
                Source: PI A19T010620.exeBinary or memory string: OriginalFilenameCompletionActionInvok.exe2 vs PI A19T010620.exe
                Source: PI A19T010620.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: 2.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: PI A19T010620.exe, UT1ISfP0HmUF7h5yru/aMxeoyTl2XtxGNHxhY.csBase64 encoded string: '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
                Source: PI A19T010620.exe, RMkxix1j4WpBSOrCtp/HyqsKqF8HIu1tHY1Lq.csBase64 encoded string: 'iVBORw0KGgoAAAANSUhEUgAAACgAAAAoCAYAAACM/rhtAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAKRJREFUeNpi/P//P8NgBkwMgxyMOnDUgaMOHHXgqANHHTjqwAEGoNYMMgYCeyA+CZIiAm8HYhWaugeLA58T6TgY3ohk/l4S9aLjvejuwRbFEiR6WhGJ/YvCAMTQz0LlFOM5mospBBSnQVo7cDQNjqZBaqTBpyQ66hEt0yC2msSDhNrkEhBr0bKqYxwdWRh14KgDRx046sBRB446cNSBQ9qBAAEGAPhFqjdpHPl0AAAAAElFTkSuQmCC'
                Source: PI A19T010620.exe, KmCTf3r14i9sSqxs5ok/RFJlX4rFCGp00pxrbq5.csBase64 encoded string: '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
                Source: PI A19T010620.exe, iMW8vPrqMl8WDQWgJ9A/oCFkMergQS9qeMrer0U.csBase64 encoded string: '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
                Source: PI A19T010620.exe, kPcEgIDe3LcBgmnfa5/dXcJw5eSqWyl8tPiJi.csBase64 encoded string: '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', 'iVBORw0KGgoAAAANSUhEUgAAACwAAAAsCAYAAAAehFoBAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAAH/SURBVFhH7ZjPKwVRFMf9NTaUtbIhLC2IDXtra2t7ayUsJA8JsbCxsLGgR7yX915Kkli8nWyvPi+3NH3nx713Jk1m6lOvmTvnfJrunHPm9fWv102ZqISLphIumv8jPLh5a4a3783EXtNMHT6auZO2mT/t9OA357jGGtaqGD44Cw9t3ZnR3YaZOWqZhbNOJljLPdyrYrrgJDyy82CmHUSjcC8xVOysZBIe2Lg147WmlPCBWMRUudJIFSbw5H5+shZi+kinCuf5ZKMQW+VMIlGY/aYS5Ynrno4V5o12qQRLF8/moN3tsXL1KtcoyOFSPWKFKUMqQRxI2gNptSaOsVpDOiikMIXe5elCiPDscStzc5HCdCcVOIkQYSCncokihWmpKmgSocLkVC5RpDBzgAqaxOL504+uMas3b3JNEuRULlGkMMOLCpqGPVyqhIWcyiWKFGbiUkHTsIePMDmVS5RchZvdr56wupZGkLDvlggRDtoSPi8dXL9/egsHvXQ+ZQ1oz8uXL/JaGkFlzadxIMqWgLW7D7kmiaDGUbrWDKUafsB1vPQlt/ESSjXAW0r1iQSl+wgFAuf5pInlIwuZhC3st1L8kfIb3mjKELVTSSlYyz0u1SAOZ2ELhZ7uREtlDmB4YeICfnOOa6zJ2hSy4C38V1TCRVMJF00lXDQlE66bb+YGhyafMUw8AAAAAElFTkSuQmCC'
                Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                Source: C:\Users\user\Desktop\PI A19T010620.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI A19T010620.exe.logJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMutant created: \Sessions\1\BaseNamedObjects\fOKJpBwJFCycnicKjUmQBO
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6160:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_01
                Source: PI A19T010620.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\PI A19T010620.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\PI A19T010620.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: PI A19T010620.exeVirustotal: Detection: 51%
                Source: PI A19T010620.exeMetadefender: Detection: 42%
                Source: PI A19T010620.exeReversingLabs: Detection: 78%
                Source: unknownProcess created: C:\Users\user\Desktop\PI A19T010620.exe 'C:\Users\user\Desktop\PI A19T010620.exe'
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\PI A19T010620.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: PI A19T010620.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PI A19T010620.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: PI A19T010620.exeStatic file information: File size 1141760 > 1048576
                Source: PI A19T010620.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x116200
                Source: PI A19T010620.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: RegSvcs.pdb, source: NXLun.exe, 00000009.00000002.744648798.00000000001B2000.00000002.00020000.sdmp, NXLun.exe, 0000000D.00000002.761737974.0000000000AB2000.00000002.00020000.sdmp, NXLun.exe.2.dr
                Source: Binary string: RegSvcs.pdb source: NXLun.exe, NXLun.exe.2.dr
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00699098 push eax; retn 0067h2_2_00699099
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00707E3F push edi; retn 0000h2_2_00707E41
                Source: initial sampleStatic PE information: section name: .text entropy: 6.92181951931
                Source: PI A19T010620.exe, qvNbH0bvCJJ5sEdLep/Mu0PaDBWeKE0LGaBNq.csHigh entropy of concatenated method names: 'mOnOXOUwh', 'm8ImXYlKc', 'e4w5HguIr', 'USVF5dQiA', 'HAwBR59RN', 'vqklYUbcc', 'zEUSq2lGb', 'UMQoqHpTO', '.ctor', 'DWlb84ZTB'
                Source: PI A19T010620.exe, GvGHWtr8geVHcOaSpSQ/yuW4QUrdELxq4VKqupN.csHigh entropy of concatenated method names: '.ctor', 'qRx3ltqnCe', 'ocO3ZwfBWr', 'MhL3otCdYV', 'nwN3nBeFEt', 'dGG34ecTQW', 'KBG3t5Wwtu', 'uu33pun9ro', 'U9k3PUywvg', 'uFr3UTeI1F'
                Source: PI A19T010620.exe, UT1ISfP0HmUF7h5yru/aMxeoyTl2XtxGNHxhY.csHigh entropy of concatenated method names: 'UsGsuGBBDX', 'CqQsA6iZ1r', 'U99sWxRHOW', 'mWbs7EIPTE', 'pKfs6Cvf4b', 'vKssCFte4H', 'udcsJIh3gI', 'l9dsEUxDZY', 'SSUswtmabh', 'Ungs4fQrcD'
                Source: PI A19T010620.exe, RMkxix1j4WpBSOrCtp/HyqsKqF8HIu1tHY1Lq.csHigh entropy of concatenated method names: 'uG3RJXEdRt', 'uSKRE4RxQB', 'AO3RicTRhO', 'hGgR1Sh2Cw', 'aIFR8wtPj2', 'nYSRbOJGCf', 'HxeRMgphAT', 'U6dRq301Su', 'i6lROZaLcR', 'jH3Rmbp0OV'
                Source: PI A19T010620.exe, hZAeC2fEYD9FWvhh5Ln/eEUUDxfiDtqFjqBhlph.csHigh entropy of concatenated method names: '.ctor', 'wbaZtpQYI2', 'mrZZdAP48w', 'c9dZPBBEnA', 'EWMZ9sfahL', 'NNKZkMfWl7', 'Sk0ZHIkvNt', 'Js8ZGkoS7j', 'cB5ZhrBPDh', 'RoqZImq4WH'
                Source: PI A19T010620.exe, QaZNhsfndbfHBGyQ8EL/CXA7vSfyF9K0IG3AJbs.csHigh entropy of concatenated method names: '.ctor', 'An5Zxhjwwj', 'D27ZrK7Ikj', 'CGcZNqo863', 'li6ZYtZMhN', 'TRCZs3Jcia', 'xBXZyOH9NJ', 'q1sZeYkOEE', 'R6xZuZF2KY', 'O5cZ2Oa388'
                Source: PI A19T010620.exe, ddL9GirCgCIKOyWCoNL/nZAuOwrooLuGGMtQE0Q.csHigh entropy of concatenated method names: '.ctor', 'LRIaz56K9f', 'c4H5xWIgbd', 'utM5gW3ZPg', 'kfq5NChqAc', 'EZw5VNwqjT', 'o1Y5stBpX1', 'VAu5RUcqyH', 'meN5ey7EMk', 'ycW5AJvCmL'
                Source: PI A19T010620.exe, Mjka9AJt0E95AD8pJE/CEgL45hGJBT7UFEJuj.csHigh entropy of concatenated method names: 'PYLy0pVdRo', 'jQny6EeIJ3', 'FanycwVsHb', 'jOCyJEXXRo', 'T6HyDIksoJ', 'R5QyijQWoF', 'dphyv3Zk73', 'er3y8COlko', '.ctor', 'A5Iy3O5cFE'
                Source: PI A19T010620.exe, xOOfAYUowQ6uAjwZT6/G23hX46CX2lNrgUZjK.csHigh entropy of concatenated method names: '.ctor', 'nTAyxurmVO', 'Dispose', 'jVEyrVxRkf', 'i9byggZOBs', 'xE2yNfo1SD', 'bdKyYEAhSM', 'tQnyVw1gPM', 'neORWXGo5K', 'xJtRU4s8Eh'
                Source: PI A19T010620.exe, Oit1GxfAD86vqb1eKx5/GxLljWfVQJW2c9AKuTw.csHigh entropy of concatenated method names: '.ctor', 'Ij7l0XPPLL', 'jHgl68rXgS', 'lcVlcjKJq7', 'do3lJMndQl', 'n2PlDu8449', 'Syylix21tK', 'tbrlvVZIMa', 'AvIl8wVoPZ', 'HjWl3bkdXx'
                Source: PI A19T010620.exe, L93p1Bf52J4VPEi19ma/YSMLSkfO52kD10v10vR.csHigh entropy of concatenated method names: '.ctor', 'xh2BpoRkHA', 'dlwBPS9yIA', 'INCBUDo1Jr', 'HkMBkdb4n6', 'HyEBXMtOKy', 'cXNBGrywKE', 'rNmBQCKMvm', 'cuEBIMKKUh', 'YAFBT1scsC'
                Source: PI A19T010620.exe, t3ufytffQe11T2tar6Z/v9UcmGfrJTHajHXn3MQ.csHigh entropy of concatenated method names: 'CsFBaBFmGC', 'LNdB5EpdFH', 'JCSBjuDtic', 'kZDBBQBuTN', 'gaUBZUSeSR', 'vSSBSaCP64', '.ctor', 'lAmBO8QcjO', 'SblBmC9jk8', 'yvD4HSidvBcfipJjJaG'
                Source: PI A19T010620.exe, WnGAs4rUs3iaNCOsSXl/i5UZA9r6Yg2MxxStHvD.csHigh entropy of concatenated method names: 'z36vl33H7L', 'CPevZEaNNW', 'c3FvEn3dSf', 'WByvDXGNW3', 'U9iv1PAWpv', 'mGivvoB534', 'hkuvbNDVUp', 'Xh1v3E6S1I', 'MqKvq5ZXYY', 'qG2vKCOs3o'
                Source: PI A19T010620.exe, expMlPrPdgkRpO8Mdqx/mSqcV4rTrNQsaKpWjIL.csHigh entropy of concatenated method names: 'Xav1SScZOD', 'o8U1o6Sfiy', 'ygr1wjbYbT', 'Ks21488fca', 'oPi1dFvTs7', 'ioJ1pkaaeU', 'NQe1990rvL', 'Ipn1UWNGch', 'lUA1Havqx7', 'hHk1XDvEMp'
                Source: PI A19T010620.exe, JaMp6vr3A8XRuLJna99/XgclaBrKJI1x7o4PDiT.csHigh entropy of concatenated method names: 'BOM1uVKrsS', 'uXu1AqYpix', 'tyaiHaFf94', 'IYLiX8v36D', 'uDyihlMt3J', 'uBCiQvyYmU', 'd37ifsSk3v', 'RjbiTKUbrT', 'zCmizWATNm', 'fMA1xyVKMV'
                Source: PI A19T010620.exe, Ps8iYf3X87ONisiTGU/Y96rkSKLNRfGMUPdjW.csHigh entropy of concatenated method names: '.ctor', 'PbxVJM7TKp', 'uBWVEf8Bo8', 'NERVihJ3to', 'RBVV1IJELM', 'L9oV85fEYY', 'AvmVbhGuXr', 'CveVMHoSvy', 'r7rVqrhrfu', 'dIeVOMiCH8'
                Source: PI A19T010620.exe, wshKeM4nRiLoh8Pem4/GCTyu9l2Qrje7bP0Ey.csHigh entropy of concatenated method names: '.ctor', 'knJVy281KG', 'x0vVRFsNx1', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'a8pVs8YyTx', 'QV6hVMXA4l37oWt2Ku1', 'zrBdioXU8wEfuN0xbCf'
                Source: PI A19T010620.exe, dBIZYEvkARSnmHahkm/WvYP6cND47pRiI37kw.csHigh entropy of concatenated method names: 'UWFY5tS2Kr', 'WEKYBaZQXu', 'IQMYlhR0u6', 'xZ0YS3Moiy', 'kuGYoAaoBc', 'yO0YwPkC8O', 'tHBY4ABRjx', 'vl6YdIdn4m', 'XUhYpXmyWd', 'JrOY9G7EuB'
                Source: PI A19T010620.exe, M0LrV7rMSRRc0uB1OSO/yRbe2QrWPMYoHF4CtfL.csHigh entropy of concatenated method names: '.ctor', 'IBkCorVwvW', 'fZRCnakViD', 'AiQC4Xib2T', 'n5jCt8uXHe', 'oFCCp4H4Si', 'fIGCPNmCIB', 'yLmCUyEuAS', 'DSKCkGZA0y', 'DTkCXgntZs'
                Source: PI A19T010620.exe, c06joxrb6sVkysY8371/lHNJvTrB12D5h48U1Bp.csHigh entropy of concatenated method names: 'LBtCutgsO4', 'bhgCAOTLBe', 'sT16DcityL', 'HRM6iwqHhQ', 'waO6vQnCGd', 'SJu68bowVe', 'Uhk637ch27', 'x4U6M7ChFp', 'K3i6KseL2Y', 'QjG6OcSICt'
                Source: PI A19T010620.exe, TB6UUZrE1N4emrxgMA3/XCXEtkriXqCqXP9k4TX.csHigh entropy of concatenated method names: '.ctor', 'IXw6eGq4J1', 'MPD6uRbbIJ', 'pT26245Kn0', 'JAc6W1Ke3I', 'frN6gubYZb', 'JDe6NJMW3P', 'EdV6Y8794q', 'noc6VALbqS', 'Ob46spy69p'
                Source: PI A19T010620.exe, k35AJrrjov5CT8YOyby/SdSDYDrwHNpiUsXFZCJ.csHigh entropy of concatenated method names: 'fUXDWVwu9K', 'IXtD7Q5LZ2', 'ixgDAEp7tW', 'XSND6b7T1Y', 'xEmDCuBeag', 's8iDJSVemd', 'YpRDEdrpiB', 'S3eDiHp5u2', 'YfyD1ofJ3n', 'l3DD8JtA4K'
                Source: PI A19T010620.exe, dgLZULrmuWKaOdT1Sm6/uCfR49rYYoxiuZ5LCUD.csHigh entropy of concatenated method names: '.ctor', 'DCxEXyYbrI', 'XxcEGTSK0V', 'PraEQVlwlg', 'l8TEIG1WkL', 'lijETYs2G6', 'CWOELJvshF', 'JLuDxhNLRR', 'hXFDr5thLY', 'Rg4DNM4qh4'
                Source: PI A19T010620.exe, RkxwEbr7JACwwMQIIHE/rgTQcqrXXxHcIy8tpM1.csHigh entropy of concatenated method names: 'I7qRibjELR', 'W6BRRkLJqe', 'dl2Ej5tqJU', 'abqEBoNLYI', '.ctor', 'aSLE3h2U0u', 'vHHEMB67O8', 'H1YEqq4EKu', 'jreEKTWqpU', 'uEXEO4pZvM'
                Source: PI A19T010620.exe, NUZc1Crn81b9G1ahWxW/UVbD3jry0OlPt602ZaR.csHigh entropy of concatenated method names: 'WDR0P6mAyc', 'eol09MtJW7', 'sMy0kOufaN', 'n1U0HwiesF', 'E2p0GlVPO4', 'yjQ0hjipAw', 'HEI0Ig1B9V', 'VTu0f62wXR', '.ctor', 'mEp0pjyfML'
                Source: PI A19T010620.exe, XIwMhbrAEW6dqcU9Cj1/guwq8LrV67Y8PFpNt5L.csHigh entropy of concatenated method names: '.ctor', 'vko0smhv64', 'jDC0y7ETje', 'qTS0Rn1ccn', 'VMo0eF7TS2', 'DXA0uRwIvv', 'T6E0ATmF16', 'jF706ReZWk', 'JMS0CqxqGb', 'Rxk0J1Rj3c'
                Source: PI A19T010620.exe, pGermbr5ZYCZGnNefvA/gClXGfrOj3kV5vBfNDC.csHigh entropy of concatenated method names: '.ctor', 'Xpj7s4HSJA', 'C6Y7yGakOJ', 'D6Y7eoC1b0', 'LJK7ufGTx9', 'Aov72bYYYj', 't7A7WnZRHW', 'hqQ70XUEKD', 'AxM76aHXsB', 'MjJ7cai5tb'
                Source: PI A19T010620.exe, bi8x5BfREGbu6QHotYg/XGdHu4fZ59d9TKs1CmV.csHigh entropy of concatenated method names: 'JjgHmCSSkB', 'kwcHaa9f4B', 'cZLHofdhqw', 'GSvHnv8L7u', '.ctor', 'wLfHF8912W', 'zQ3HjT9X1f', 'OnPaint', 'iJEHlI8Clf', 'aiRHZhFp4C'
                Source: PI A19T010620.exe, YiSXmbfcaFtycZ7kQX6/OigaMtfQa4nBvkAhu4r.csHigh entropy of concatenated method names: 'q66HWqoUHQ', 'VSjH7eaA5S', '.ctor', 'bH3HNELu9G', 'zXVHYTTSWe', 'rl7HVp5eru', 'EtJHsJYa0Z', 'pIqHyKv1R7', 'Pt3HRkhtmI', 'WaCHeYiJom'
                Source: PI A19T010620.exe, TpWq3UfMfnxjPHZRCZ6/Y5ODgWfWVXome0jtyPH.csHigh entropy of concatenated method names: 'gxXkakvtOt', 'vnyk5xjxlH', 'toakjWnU3f', 'W5CkBALqrs', 'K2MkZMcSjl', 'f6ukSg7FdK', 'jmfkn8ex1l', 'lJnkwfnWRA', 'iI8ktUgldd', 'zeskdbGu66'
                Source: PI A19T010620.exe, kEyPnmr2d7OYWIbJeby/FwbwbtrpF53Pofe6FFY.csHigh entropy of concatenated method names: 'xty3sDdTuS', 'phx3yv9cHq', 'BBE3ew4yry', 'f0U3u3U7Ml', 'LJk327xYOo', 'Cah3WfT29I', 'EvQ3rI6xGT', 'IWc3gAaSmT', 'Qu63N59umH', 'w6f3Yb2TSx'
                Source: PI A19T010620.exe, KmCTf3r14i9sSqxs5ok/RFJlX4rFCGp00pxrbq5.csHigh entropy of concatenated method names: 'ENfbbMVXwb', 'FT8b39xxZA', 'g3Jbq98J7g', 'ss6bKcYE0R', 'MkAbmQZPdq', 'm1UbauiVcU', 'bPPbFKRcMg', 'R9SbjsB64M', 'J52bAaGhjr', 'n1yb26oujT'
                Source: PI A19T010620.exe, iMW8vPrqMl8WDQWgJ9A/oCFkMergQS9qeMrer0U.csHigh entropy of concatenated method names: 'OH28XNSL72', 'LcI8GgqfjE', '.ctor', 'eyX8opLiWD', 'HPL8nuCo8w', 'SWs8w6vIwt', 'OnMouseDown', 'OnMouseMove', 'OnPaint', 'SRZ845cUwy'
                Source: PI A19T010620.exe, hVrypICD3dKwNjRx0R/gT3MKQojXMG6Y14VVb.csHigh entropy of concatenated method names: '.ctor', 'OnHandleCreated', 'Li5AUvQ9AB', 'up9Ak4RtFG', 'NZpAXjQFFv', 'xpUAGSVoew', 'OQjAQIgu3Z', 'vQVAIrq1L4', 'SHSATSYNkR', 'lq2ALgYx85'
                Source: PI A19T010620.exe, aN1xgRIeguNOCCxGYW/hb6Edgs3ZK9pk3sKD0.csHigh entropy of concatenated method names: '.ctor', 'rtruKfZRku', 'n7buOVOIHC', 'NmjumfTI8V', 'CmduaYW1GS', 'COBuBsgZUP', 'h0mulW4AHG', 'aOguS1ZexY', 'DoSuoxoxau', 'FGkuwG6QKU'
                Source: PI A19T010620.exe, G28btxL2EwLJFwx0r8/QGT5AYt9aIGex0H6wT.csHigh entropy of concatenated method names: '.ctor', 'V8IuEeSqov', 'm29uDDk3sH', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'l3KuJEooM0', 'B8jAkrjRpPIqSxcqy67', 'NH4c2EjFCuPr8BvWYQf'
                Source: PI A19T010620.exe, TEkNgZcUfBqO9Le63S/nEMEqKQewpKDHOrAgx.csHigh entropy of concatenated method names: 'g3Tr5vkJ0A', 'qKOrFWwxkO', '.ctor', 'L66rBS2Pfk', 'OtTrl7aiLS', 'EdLrOXagcO', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'p0Srm0BxSd'
                Source: PI A19T010620.exe, NUnIEOMICypYa3yhqO/cawnI9WcjvtCcZ3KK3.csHigh entropy of concatenated method names: 'GDArYmB7VU', 'zLsrV9Di08', 'tnMrWT2ZdO', 'qFtr7Vy7m7', 'p6Jr6uXNvV', 'DFprCOw4m6', 'iHarJKqRgA', 'kVIrEqaoaO', 'yfBryFBRje', 'K7NrR0FDQj'
                Source: PI A19T010620.exe, Pw4Elpruj1J0ryNiqmR/eLOH4Wra2T7nKIsxccX.csHigh entropy of concatenated method names: '.ctor', 'BG9JTX2HT2', 'vOaJLWY6WS', 'C6PExCoZtX', 'KA9ErClN0b', 'we7ENCbGKU', 'EdZEYRjPrC', 'DKxEssTq0J', 'JuREyyqOCG', 'RMPEerLJ5x'
                Source: PI A19T010620.exe, kNfBiUrRaRf74rnsNbO/UU4y2BrZ7c6P9sSdMgw.csHigh entropy of concatenated method names: 'OnCreateControl', '.ctor', 'HWvRPl9u8G', 'O46RzYXQ3I', 'obuJgB4lR2', 'yeZJNYnT7O', 'u8nJV5FrBu', 'j6vJsshkMF', 'aNkJRl4dBM', 'H5GJeKdLBH'
                Source: PI A19T010620.exe, qubwQ6rcbJMrGc1sOxJ/SkH5jurQLSsxbSqi9hL.csHigh entropy of concatenated method names: 'TbNc7ig1MF', 'zO1c0ha4qP', 'fsacC0Pcl7', 'EoQccyyh7i', 'tL3cEvC8PO', 'U5icDNELVf', 'AIYc1M0ExY', 'zCBcvSnA1F', 'pLIcbCAQkB', 'ucsc3oyCwH'
                Source: PI A19T010620.exe, svq7VgrI8LVFXr081V8/I5rFJBrs505ZlL8i0bt.csHigh entropy of concatenated method names: '.ctor', 'NR6mks7Zh0', 'VDkmHjvBZA', 'HrAKBdCR9n', 'f76Kl0a64p', 'rlgKS2ulyf', 'KikKoAAWSR', 'x08Kwsyc5C', 'TfMK44UjXT', 'zONKdT49Ia'
                Source: PI A19T010620.exe, f90E96rfJxwLZHVoEPb/efnfIWrrDCJji1QdFyb.csHigh entropy of concatenated method names: '.ctor', 'KN2WAEN3vS', 'dn8WWLvPXQ', 'jdPW0yxwYU', 'iLPWCVS0vV', 'OhMWJ3Au8Y', 'km2WDIulHh', 'RI1W1jOxTy', 'vOmW8WO7QM', 'Fl0W30utgX'
                Source: PI A19T010620.exe, UfqD1SrxNbvZ05hIZa7/ARlN3UzOvIPQnyOItU.csHigh entropy of concatenated method names: '.ctor', 'pJi2phvde9', 'GcF2PEk3Pb', 'nfw2UbFAmo', 'JQX2k2y7ii', 'mbe2XvvCEh', 'HVJ2GTUnra', 'V9l2QUdtcr', 'Dly2IoBkV3', 'OyZ2TDZk7B'
                Source: PI A19T010620.exe, kPcEgIDe3LcBgmnfa5/dXcJw5eSqWyl8tPiJi.csHigh entropy of concatenated method names: '.ctor', 'OnHandleCreated', 'Ls32Ojy9iI', 'lJR2mAoQs7', 'pUs25qSDXh', 'dYg2Fo4aeu', 'nDr2BWPv9S', 'sGY2lSlllY', 'OnPaint', 'b2h2K3GYVA'
                Source: PI A19T010620.exe, YKJXoTfbHjPS3dRvVt6/mcvm7KfBQUKbHVxkAFV.csHigh entropy of concatenated method names: '.ctor', 'OnCreateControl', 'lJZYguTP0G', 'dclYQ9r6tt', 'h3qUyA812C', 'SNhURYefJP', 'UAKpJJFvOw', 'DgSpEri2qO', 'get_Text', 'set_Text'
                Source: PI A19T010620.exe, bWA67Dr4PGODkKsd3MA/bUsS7jrlvrsGYOTa8M5.csHigh entropy of concatenated method names: '.ctor', 'qVNia6nAep', 'qGGi5iJv30', 'jN2icLaeIv', 'RLLiJBQSCJ', 'h4FiDfol6x', 'o4jiiwEG0x', 'BZ5ivHJuIe', 'lfCi8tATjl', 'qUvi3lvD10'
                Source: PI A19T010620.exe, zdSQLjrvUJvfCm6EFaO/l0ZKpJrNRNrVNwNwHSr.csHigh entropy of concatenated method names: '.ctor', 'dufiR30NTt', 'rKkieFe9Yi', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'KMEiyfyeMx', 'b79IRRc5paqTB2uqWZt', 'KY73gOcSZKiS6gOvcfg'
                Source: PI A19T010620.exe, w12wEXrHI1LfwKweRMe/xCgFqrrkGtRdSjHU13Y.csHigh entropy of concatenated method names: 'jITDdexouc', 'Do2DpKVrbS', 'BLCDhsWj83', 't13DQxwIdy', '.ctor', 'zvdD9O6Ksy', 'asqDUfoFb8', 'OnPaint', 'su5DHIjcw0', 'rdLDXceVka'
                Source: PI A19T010620.exe, cyEW2dHuBy8hL5yC2Q/kn5UTokeoSM2RDLulu.csHigh entropy of concatenated method names: 'Pt7YEFYEqg', 'SKSYD3oFa2', 'w4oY1yUlyu', 'f9IYvEhVBP', '.ctor', 'Y00YJffUfF', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'fftSewXZri3DHxCbe4X'
                Source: PI A19T010620.exe, Iof4l7j34kf2ZpWd1u/EBEI1AwyoVhee6cf6d.csHigh entropy of concatenated method names: 'sFwNNEy1gw', 'FqNNYXRJ0y', 'HxFNstN2c4', 'awkNyfZE8M', 'NtaNeqqtps', 'm1ENuU223R', 'FNwN2pPIhx', 'gASNWwPVeF', 'T4DN0Qp1WA', 'b5jN6w38aZ'
                Source: PI A19T010620.exe, gqq7jtmClPOY7xenAE/mMa6LFYpUR8VNxv992.csHigh entropy of concatenated method names: 'BMlgnt8y1P', 'zgEgwEpsgC', 'j4Egt7uPlH', 'BAxgdjMkaw', 'NPHgPdc8Dr', 'mo5g9UOhgM', 'rpNgkw92Il', 'HP5gHFuysa', '.ctor', 'mhCgGRS7dN'
                Source: PI A19T010620.exe, qXRYvtfxT7M0Zisbrgg/zdP6jHrzQd6FHBbcjHL.csHigh entropy of concatenated method names: 'Q7fjLrpUyp', 'oXSjzmxRhZ', 'olKBrh9ONL', 'rfiBgmuFsF', 'HYNBYMUeib', 'WxXBVEpR1t', 'V1KByl39DC', 'TLXBRwM5i4', 'hhbBubyRED', 'VYmBAYsYOO'
                Source: PI A19T010620.exe, HcJBW9rDUdG46SufC67/oxTtxCreEXDeoj6A219.csHigh entropy of concatenated method names: '.ctor', 'RMuFbFLrNo', 'vd9F3nnnMa', 'DsTFqJiLk4', 'rLsFKOJ85v', 'oNTFm35ET6', 'fRjFar5jTM', 'SjwFFlQqAJ', 'VE7FjnS1Ux', 't3bFlAyxU7'
                Source: PI A19T010620.exe, aGQlZLr0ZQC5TpkZpkY/fEXDcorGMnmkMNOvVcU.csHigh entropy of concatenated method names: 'wAd8MuhGqf', 'fTk8qFXhU2', '.ctor', 'CaE8iVklRM', 'gQw813j6Bg', 'OnPaint', 'Ghg88gNOGg', 'b1O8bGctSP', 'OnMouseDown', 'OnMouseUp'
                Source: PI A19T010620.exe, XSPbb7rSqXrNKk57Is1/neDe0Ar9B8Z7yr0GeMQ.csHigh entropy of concatenated method names: 'hvU8YNOtL8', 'nlO8VyRDbt', 'hrm8um9yjQ', 'Ap88ATKFFC', 'pxQ8yJaTP5', 'hH38RJiWGG', '.ctor', 'OnPaint', 'OnHandleCreated', 'OnMouseDown'
                Source: PI A19T010620.exe, TKIqKrrJSMCF3cR3jQo/LKUkO1rhSBaXSTYOW8S.csHigh entropy of concatenated method names: 'DxZvko5IWB', 'IhBvHNgmdN', 'YFqvXuSgEY', 'TZ2vG7DILO', 'KMmvhjk0hj', 'KVOvQu6Ubs', 'OcSvIC2KNs', 'IkBvfoMM9y', 'pk7vT1YKaC', 'z4rvLCjGZF'
                Source: PI A19T010620.exe, JHR6bA2WgnHVsNT90J/u7EyJBpHVgGCJbEPLm.csHigh entropy of concatenated method names: '.ctor', 'OnHandleCreated', 'OnPaint', 'OnMouseDown', 'OnMouseUp', 'OnMouseMove', 'CdYuA7YL6P', 'EJ7oxTjTABlJASCTAsJ', 'JtgFALjYuUKJCDebOsE', 'dp0KrQjqGlZci8qEFkl'
                Source: PI A19T010620.exe, Il4lVqqTqsoIm5GUPW/UAFWbpgnQrYo4IBQrD.csHigh entropy of concatenated method names: '.ctor', 'Tw8yUuF6Iu', 'nB3ykpwhgm', 'aHuyXmucbv', 'twRyGW75oA', 'pmeyQOyMte', 'JldyIHEdjB', 'AqHyTEcdaf', 'WdcyLG0Wjt', 'iy5RxNaWpU'
                Source: PI A19T010620.exe, WLhL3j0Po2diqxEOpP/GdvFXVGLJW6fHt5wVR.csHigh entropy of concatenated method names: '.ctor', 'I7qRibjELR', 'W6BRRkLJqe', 'yEtyoZ493S', 'BkDynRtJJu', 'Ya3yjZk8Er', 'AVwyBEXO0y', 'J0eylncwa1', 'A0QyZK8DtM', 'xiaySEm6ik'
                Source: PI A19T010620.exe, cNcgk977VGDMsdmMIV/Md38YDX2AOWwlRTZF3.csHigh entropy of concatenated method names: 'RhTguQbjdu', 'FDlgAgHDfu', 'KTRgWl4BML', 'E9wg7XOyZ7', 'Dvhg6T5Xf5', 'KCJgCEWPCX', 'WsLgJTk1hj', 'W1tgEmwfbW', 'SfTg8b4YqZ', 'oLjgbgUrsN'
                Source: PI A19T010620.exe, iRkBQMuL5IF0wVFbsw/ane5E2aXAHXXyV5qqT.csHigh entropy of concatenated method names: 'Sd4rICgaXe', 'meurfmugKP', 'kdfrT5Vi5o', 'djHrLaZV7U', 'XIarzBp1bQ', 'xCVgxjL4e4', 'BbcgrYDbxk', 'YeRggRW7Sf', 'tbXgNK0OqY', 'S9VgYdeKHk'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NXLunJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NXLunJump to behavior

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\PI A19T010620.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9556Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exe TID: 7028Thread sleep time: -46532s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exe TID: 7092Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe TID: 5864Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe TID: 4940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\PI A19T010620.exeThread delayed: delay time: 46532Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: RegSvcs.exe, 00000002.00000002.903548471.0000000005620000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: RegSvcs.exe, 00000002.00000002.903304023.0000000005510000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00695B98 LdrInitializeThunk,2_2_00695B98
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 235008Jump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: RegSvcs.exe, 00000002.00000002.900699207.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Users\user\Desktop\PI A19T010620.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PI A19T010620.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings:

                barindex
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6464, type: MEMORYSTR
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6464, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6464, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection212File and Directory Permissions Modification1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery111SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information21NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsVirtualization/Sandbox Evasion131SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                PI A19T010620.exe51%VirustotalBrowse
                PI A19T010620.exe51%MetadefenderBrowse
                PI A19T010620.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                PI A19T010620.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\NXLun\NXLun.exe0%MetadefenderBrowse
                C:\Users\user\AppData\Roaming\NXLun\NXLun.exe0%ReversingLabs

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                2.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                SourceDetectionScannerLabelLink
                odessabd.com0%VirustotalBrowse
                mail.odessabd.com1%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                http://crl.microsoft.co90%Avira URL Cloudsafe
                http://r3.o.lencr.org00%URL Reputationsafe
                http://mOEDeY.com0%Avira URL Cloudsafe
                https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                http://cps.letsencrypt.o_0%Avira URL Cloudsafe
                http://mail.odessabd.com0%Avira URL Cloudsafe
                http://P02rvktl5O.com0%Avira URL Cloudsafe
                http://odessabd.com0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://api.ipify.org%$0%Avira URL Cloudsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://r3.i.lencr.org/00%URL Reputationsafe
                https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072f0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                odessabd.com
                192.185.90.36
                truetrueunknown
                mail.odessabd.com
                unknown
                unknowntrueunknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSRegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnPI A19T010620.exe, 00000000.00000003.638876019.0000000001ADD000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://cps.letsencrypt.org0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.microsoft.co9RegSvcs.exe, 00000002.00000003.880396544.0000000005619000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://r3.o.lencr.org0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://mOEDeY.comRegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                low
                http://cps.letsencrypt.o_RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://mail.odessabd.comRegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://i.imgur.com/blkrqBo.gifiThisPI A19T010620.exefalse
                  high
                  http://P02rvktl5O.comRegSvcs.exe, 00000002.00000002.901604014.0000000002788000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901542292.000000000275D000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://odessabd.comRegSvcs.exe, 00000002.00000002.901557138.0000000002765000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRegSvcs.exe, 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.org%$RegSvcs.exe, 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://cps.root-x1.letsencrypt.org0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://r3.i.lencr.org/0RegSvcs.exe, 00000002.00000003.891861586.0000000005655000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072fPI A19T010620.exefalse
                  • Avira URL Cloud: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  192.185.90.36
                  odessabd.comUnited States
                  46606UNIFIEDLAYER-AS-1UStrue

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:458957
                  Start date:03.08.2021
                  Start time:22:48:18
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 20s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:PI A19T010620.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:18
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 61
                  • Number of non-executed functions: 5
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 104.43.139.144, 104.42.151.234, 20.50.102.62, 20.54.110.249, 40.112.88.60, 173.222.108.226, 173.222.108.210, 20.82.210.154, 80.67.82.235, 80.67.82.211, 20.82.209.183
                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  22:49:19API Interceptor1x Sleep call for process: PI A19T010620.exe modified
                  22:49:31API Interceptor665x Sleep call for process: RegSvcs.exe modified
                  22:49:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run NXLun C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                  22:49:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run NXLun C:\Users\user\AppData\Roaming\NXLun\NXLun.exe

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  192.185.90.36PO-K-128 IAN 340854.exeGet hashmaliciousBrowse
                    GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                      GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                        GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                          GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                            GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                              GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                  GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                    GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                      GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                        GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                                          GS_ PO NO.1862021.exeGet hashmaliciousBrowse

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            UNIFIEDLAYER-AS-1USPayment_Advice.exeGet hashmaliciousBrowse
                                            • 173.254.28.149
                                            RuVwYj2Jax.exeGet hashmaliciousBrowse
                                            • 192.185.77.139
                                            KkPVouLuOx.exeGet hashmaliciousBrowse
                                            • 67.20.76.71
                                            Nouveau bon de commande. 3007021_pdf.exeGet hashmaliciousBrowse
                                            • 162.241.218.97
                                            wuxvGLNrxG.jarGet hashmaliciousBrowse
                                            • 162.241.216.53
                                            Amaury.vanvinckenroye-AudioMessage_520498.htmGet hashmaliciousBrowse
                                            • 192.185.138.88
                                            transferred $95,934.55 pdf.exeGet hashmaliciousBrowse
                                            • 50.87.146.49
                                            rL3Wx4zKD4.exeGet hashmaliciousBrowse
                                            • 74.220.199.6
                                            hD72Gd3THG.exeGet hashmaliciousBrowse
                                            • 67.20.76.71
                                            Products Order38899999.exeGet hashmaliciousBrowse
                                            • 50.87.146.199
                                            ORDER_0009_PDF.exeGet hashmaliciousBrowse
                                            • 74.220.199.6
                                            WWTLJo3vxn.exeGet hashmaliciousBrowse
                                            • 192.254.235.241
                                            INV. 736392 Scan pdf.exeGet hashmaliciousBrowse
                                            • 192.185.164.148
                                            7nNtjBvhrmGet hashmaliciousBrowse
                                            • 142.7.147.90
                                            Purchase Requirements.exeGet hashmaliciousBrowse
                                            • 192.185.0.218
                                            #Ud83d#Udda8 FaxMail dir -INV 000087.htmlGet hashmaliciousBrowse
                                            • 162.241.217.69
                                            Products Order.exeGet hashmaliciousBrowse
                                            • 50.87.146.199
                                            zerYOlEkZR.exeGet hashmaliciousBrowse
                                            • 192.254.235.241
                                            PO-K-128 IAN 340854.exeGet hashmaliciousBrowse
                                            • 192.185.90.36
                                            csa customers.xlsxGet hashmaliciousBrowse
                                            • 162.241.217.138

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSwift Copy.exeGet hashmaliciousBrowse
                                              SOA.exeGet hashmaliciousBrowse
                                                POSH service quotation.exeGet hashmaliciousBrowse
                                                  SOA.exeGet hashmaliciousBrowse
                                                    epda.exeGet hashmaliciousBrowse
                                                      POSH service quotation..exeGet hashmaliciousBrowse
                                                        SWIFT REF GO 20210730SFT21020137.exeGet hashmaliciousBrowse
                                                          HJKcEjrUuzYMV9X.exeGet hashmaliciousBrowse
                                                            est pda.exeGet hashmaliciousBrowse
                                                              BL COPY.exeGet hashmaliciousBrowse
                                                                DOC.exeGet hashmaliciousBrowse
                                                                  statement.exeGet hashmaliciousBrowse
                                                                    PO-K-128 IAN 340854.exeGet hashmaliciousBrowse
                                                                      PO#4500484210.exeGet hashmaliciousBrowse
                                                                        Invoice no SS21-22185.exeGet hashmaliciousBrowse
                                                                          SQycD6hL4Y.exeGet hashmaliciousBrowse
                                                                            Aggiornamento ordine Quantit#U00e0__BFM Srl 117-28050-01.exeGet hashmaliciousBrowse
                                                                              PAYMENT INSTRUCTIONS COPY.exeGet hashmaliciousBrowse
                                                                                FINAL SHIPPING DOC..exeGet hashmaliciousBrowse
                                                                                  Spare Parts Requisition-003,004.exeGet hashmaliciousBrowse

                                                                                    Created / dropped Files

                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NXLun.exe.log
                                                                                    Process:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):142
                                                                                    Entropy (8bit):5.090621108356562
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                    MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                    SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                    SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                    SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI A19T010620.exe.log
                                                                                    Process:C:\Users\user\Desktop\PI A19T010620.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1314
                                                                                    Entropy (8bit):5.350128552078965
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                    C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):45152
                                                                                    Entropy (8bit):6.149629800481177
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                                    MD5:2867A3817C9245F7CF518524DFD18F28
                                                                                    SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                                    SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                                    SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: Swift Copy.exe, Detection: malicious, Browse
                                                                                    • Filename: SOA.exe, Detection: malicious, Browse
                                                                                    • Filename: POSH service quotation.exe, Detection: malicious, Browse
                                                                                    • Filename: SOA.exe, Detection: malicious, Browse
                                                                                    • Filename: epda.exe, Detection: malicious, Browse
                                                                                    • Filename: POSH service quotation..exe, Detection: malicious, Browse
                                                                                    • Filename: SWIFT REF GO 20210730SFT21020137.exe, Detection: malicious, Browse
                                                                                    • Filename: HJKcEjrUuzYMV9X.exe, Detection: malicious, Browse
                                                                                    • Filename: est pda.exe, Detection: malicious, Browse
                                                                                    • Filename: BL COPY.exe, Detection: malicious, Browse
                                                                                    • Filename: DOC.exe, Detection: malicious, Browse
                                                                                    • Filename: statement.exe, Detection: malicious, Browse
                                                                                    • Filename: PO-K-128 IAN 340854.exe, Detection: malicious, Browse
                                                                                    • Filename: PO#4500484210.exe, Detection: malicious, Browse
                                                                                    • Filename: Invoice no SS21-22185.exe, Detection: malicious, Browse
                                                                                    • Filename: SQycD6hL4Y.exe, Detection: malicious, Browse
                                                                                    • Filename: Aggiornamento ordine Quantit#U00e0__BFM Srl 117-28050-01.exe, Detection: malicious, Browse
                                                                                    • Filename: PAYMENT INSTRUCTIONS COPY.exe, Detection: malicious, Browse
                                                                                    • Filename: FINAL SHIPPING DOC..exe, Detection: malicious, Browse
                                                                                    • Filename: Spare Parts Requisition-003,004.exe, Detection: malicious, Browse
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                    C:\Windows\System32\drivers\etc\hosts
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):11
                                                                                    Entropy (8bit):2.663532754804255
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:iLE:iLE
                                                                                    MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                                    SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                                    SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                                    SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: ..127.0.0.1
                                                                                    \Device\ConDrv
                                                                                    Process:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1141
                                                                                    Entropy (8bit):4.44831826838854
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                                    MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                                    SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                                    SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                                    SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                                    Malicious:false
                                                                                    Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                                                                    Static File Info

                                                                                    General

                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):6.916784541748945
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    File name:PI A19T010620.exe
                                                                                    File size:1141760
                                                                                    MD5:62aaab0942211b9d11a7755d1970adfd
                                                                                    SHA1:2703f7f409aeb01b0d68e83f336241f4b7923532
                                                                                    SHA256:23e9628689de5cffc14abcc1d39a259f54bde8e50304af29d4e127359163e1c4
                                                                                    SHA512:c408ae66a98fa70b14f2e3527078bd7b1bca862b7f071efdf78caa7fb8b7d82c6de78a088981bda1d48f30034063488fe8094f3e39aedeecdb194755667f13a9
                                                                                    SSDEEP:24576:YP9ZVh8b4lyJE84wq/dExJaK6ptDPgfqNE5D6+fVahiLXXFM:cNgJaK6LI5+8VFLXV
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a.................b............... ........@.. ....................................@................................

                                                                                    File Icon

                                                                                    Icon Hash:00828e8e8686b000

                                                                                    Static PE Info

                                                                                    General

                                                                                    Entrypoint:0x5180de
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                    Time Stamp:0x6101FAD1 [Thu Jul 29 00:48:17 2021 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:v4.0.30319
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                    Entrypoint Preview

                                                                                    Instruction
                                                                                    jmp dword ptr [00402000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al

                                                                                    Data Directories

                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1180900x4b.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x11a0000x5fc.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x11c0000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                    Sections

                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x20000x1160e40x116200False0.619296875data6.92181951931IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x11a0000x5fc0x600False0.435546875data4.20979745482IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x11c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                    Resources

                                                                                    NameRVASizeTypeLanguageCountry
                                                                                    RT_VERSION0x11a0a00x370data
                                                                                    RT_MANIFEST0x11a4100x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                    Imports

                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain

                                                                                    Version Infos

                                                                                    DescriptionData
                                                                                    Translation0x0000 0x04b0
                                                                                    LegalCopyrightCopyright Microsoft 2014
                                                                                    Assembly Version1.0.0.0
                                                                                    InternalNameCompletionActionInvok.exe
                                                                                    FileVersion1.0.0.0
                                                                                    CompanyNameMicrosoft
                                                                                    LegalTrademarks
                                                                                    Comments
                                                                                    ProductNameQManager
                                                                                    ProductVersion1.0.0.0
                                                                                    FileDescriptionQManager
                                                                                    OriginalFilenameCompletionActionInvok.exe

                                                                                    Network Behavior

                                                                                    Network Port Distribution

                                                                                    TCP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Aug 3, 2021 22:50:58.705452919 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:58.839899063 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:58.840009928 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.108015060 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.108342886 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.243237972 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.243637085 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.384365082 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.439254045 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.451309919 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.595920086 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.595977068 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.596014023 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.596040964 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.596637011 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.596685886 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.597628117 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.608211994 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:50:59.743293047 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:50:59.798686028 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.008275032 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.142954111 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.145447016 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.280286074 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.280983925 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.423499107 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.425215960 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.559804916 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.560584068 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.696851969 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.697652102 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.831949949 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.832972050 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.833107948 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.833786964 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.833913088 CEST49774587192.168.2.4192.185.90.36
                                                                                    Aug 3, 2021 22:51:00.967287064 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.967323065 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.967832088 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.967968941 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:00.968539000 CEST58749774192.185.90.36192.168.2.4
                                                                                    Aug 3, 2021 22:51:01.017597914 CEST49774587192.168.2.4192.185.90.36

                                                                                    UDP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Aug 3, 2021 22:48:55.291927099 CEST5309753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:55.316600084 CEST53530978.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:56.142010927 CEST4925753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:56.169701099 CEST53492578.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:57.428899050 CEST6238953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:57.456579924 CEST53623898.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:58.600797892 CEST4991053192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:58.625504017 CEST53499108.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:48:59.775897980 CEST5585453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:48:59.804531097 CEST53558548.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:00.779062986 CEST6454953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:00.810673952 CEST53645498.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:01.825337887 CEST6315353192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:01.864815950 CEST53631538.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:02.651316881 CEST5299153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:02.676393032 CEST53529918.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:04.580542088 CEST5370053192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:04.606900930 CEST53537008.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:05.499711037 CEST5172653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:05.524569988 CEST53517268.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:07.254586935 CEST5679453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:07.285353899 CEST53567948.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:08.246965885 CEST5653453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:08.279789925 CEST53565348.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:09.071966887 CEST5662753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:09.104526043 CEST53566278.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:09.863805056 CEST5662153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:09.888432026 CEST53566218.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:10.741626978 CEST6311653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:10.769108057 CEST53631168.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:11.963576078 CEST6407853192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:11.991105080 CEST53640788.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:12.784796000 CEST6480153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:12.809787989 CEST53648018.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:13.806740999 CEST6172153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:13.834670067 CEST53617218.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:23.310261965 CEST5125553192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:23.343287945 CEST53512558.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:38.913350105 CEST6152253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:38.970431089 CEST53615228.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:39.447201014 CEST5233753192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:39.518754959 CEST53523378.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:39.874074936 CEST5504653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:39.915977001 CEST53550468.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:40.031755924 CEST4961253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:40.066987991 CEST53496128.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:40.411207914 CEST4928553192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:40.445420980 CEST53492858.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:40.962791920 CEST5060153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:40.995408058 CEST53506018.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:41.361728907 CEST6087553192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:41.386887074 CEST53608758.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:41.834672928 CEST5644853192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:41.867868900 CEST53564488.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:42.532402992 CEST5917253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:42.560165882 CEST53591728.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:43.980654001 CEST6242053192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:44.013119936 CEST53624208.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:44.384948969 CEST6057953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:44.418787956 CEST53605798.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:48.786755085 CEST5018353192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:48.823900938 CEST53501838.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:57.782505989 CEST6153153192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:57.817826986 CEST53615318.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:49:57.967566013 CEST4922853192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:49:58.000004053 CEST53492288.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:00.768184900 CEST5979453192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:00.802253008 CEST53597948.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:32.038742065 CEST5591653192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:32.084148884 CEST53559168.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:33.875883102 CEST5275253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:33.917068005 CEST53527528.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:58.386392117 CEST6054253192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:58.556462049 CEST53605428.8.8.8192.168.2.4
                                                                                    Aug 3, 2021 22:50:58.574436903 CEST6068953192.168.2.48.8.8.8
                                                                                    Aug 3, 2021 22:50:58.609914064 CEST53606898.8.8.8192.168.2.4

                                                                                    DNS Queries

                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                    Aug 3, 2021 22:50:58.386392117 CEST192.168.2.48.8.8.80x5dfaStandard query (0)mail.odessabd.comA (IP address)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.574436903 CEST192.168.2.48.8.8.80xfa23Standard query (0)mail.odessabd.comA (IP address)IN (0x0001)

                                                                                    DNS Answers

                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                    Aug 3, 2021 22:50:58.556462049 CEST8.8.8.8192.168.2.40x5dfaNo error (0)mail.odessabd.comodessabd.comCNAME (Canonical name)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.556462049 CEST8.8.8.8192.168.2.40x5dfaNo error (0)odessabd.com192.185.90.36A (IP address)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.609914064 CEST8.8.8.8192.168.2.40xfa23No error (0)mail.odessabd.comodessabd.comCNAME (Canonical name)IN (0x0001)
                                                                                    Aug 3, 2021 22:50:58.609914064 CEST8.8.8.8192.168.2.40xfa23No error (0)odessabd.com192.185.90.36A (IP address)IN (0x0001)

                                                                                    SMTP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                                    Aug 3, 2021 22:50:59.108015060 CEST58749774192.185.90.36192.168.2.4220-lasalle.websitewelcome.com ESMTP Exim 4.94.2 #2 Tue, 03 Aug 2021 15:50:59 -0500
                                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                                    220 and/or bulk e-mail.
                                                                                    Aug 3, 2021 22:50:59.108342886 CEST49774587192.168.2.4192.185.90.36EHLO 932923
                                                                                    Aug 3, 2021 22:50:59.243237972 CEST58749774192.185.90.36192.168.2.4250-lasalle.websitewelcome.com Hello 932923 [84.17.52.25]
                                                                                    250-SIZE 52428800
                                                                                    250-8BITMIME
                                                                                    250-PIPELINING
                                                                                    250-PIPE_CONNECT
                                                                                    250-AUTH PLAIN LOGIN
                                                                                    250-STARTTLS
                                                                                    250 HELP
                                                                                    Aug 3, 2021 22:50:59.243637085 CEST49774587192.168.2.4192.185.90.36STARTTLS
                                                                                    Aug 3, 2021 22:50:59.384365082 CEST58749774192.185.90.36192.168.2.4220 TLS go ahead

                                                                                    Code Manipulations

                                                                                    Statistics

                                                                                    CPU Usage

                                                                                    Click to jump to process

                                                                                    Memory Usage

                                                                                    Click to jump to process

                                                                                    High Level Behavior Distribution

                                                                                    Click to dive into process behavior distribution

                                                                                    Behavior

                                                                                    Click to jump to process

                                                                                    System Behavior

                                                                                    General

                                                                                    Start time:22:49:00
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Users\user\Desktop\PI A19T010620.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\Desktop\PI A19T010620.exe'
                                                                                    Imagebase:0xff0000
                                                                                    File size:1141760 bytes
                                                                                    MD5 hash:62AAAB0942211B9D11A7755D1970ADFD
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Reputation:low

                                                                                    General

                                                                                    Start time:22:49:19
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    Imagebase:0x30000
                                                                                    File size:45152 bytes
                                                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.899781379.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.901158157.0000000002401000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:50
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                                                                                    Imagebase:0x1b0000
                                                                                    File size:45152 bytes
                                                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Antivirus matches:
                                                                                    • Detection: 0%, Metadefender, Browse
                                                                                    • Detection: 0%, ReversingLabs
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:51
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff724c50000
                                                                                    File size:625664 bytes
                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:58
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                                                                                    Imagebase:0xab0000
                                                                                    File size:45152 bytes
                                                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:22:49:59
                                                                                    Start date:03/08/2021
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff724c50000
                                                                                    File size:625664 bytes
                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high

                                                                                    Disassembly

                                                                                    Code Analysis

                                                                                    Reset < >

                                                                                      Executed Functions

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: \$\$\$\
                                                                                      • API String ID: 2994545307-3238275731
                                                                                      • Opcode ID: ef9d218ac49e208bc4775cff65d876543dd738f6541dc42aeff95d46e4f9554a
                                                                                      • Instruction ID: bfbeb37ab84e8d348cb300a7e96ba7a93149eec62bf5718661d18140ec9909b5
                                                                                      • Opcode Fuzzy Hash: ef9d218ac49e208bc4775cff65d876543dd738f6541dc42aeff95d46e4f9554a
                                                                                      • Instruction Fuzzy Hash: 2EE1E031B01215CFCF14AB78E8957AEB6E2FF84318F14852AD516EB295EF34DC818B91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: h h$t
                                                                                      • API String ID: 0-839380154
                                                                                      • Opcode ID: 86dbfe5412125ae635d9cb2e1015753878079c3224913d0545df5f2410fdc342
                                                                                      • Instruction ID: cca93692338472871881ef06032ac32195eaa2adaf3cf701404078d9405b4e50
                                                                                      • Opcode Fuzzy Hash: 86dbfe5412125ae635d9cb2e1015753878079c3224913d0545df5f2410fdc342
                                                                                      • Instruction Fuzzy Hash: DE836E31D0475A9ECB21EF68C8546D9F7B1FF9A300F15C69AE048AB261EB349AC5CF41
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900332592.0000000000700000.00000040.00000001.sdmp, Offset: 00700000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D0l$D0l$D0l
                                                                                      • API String ID: 0-3785626926
                                                                                      • Opcode ID: 16f10bb05e4ddba838739cf9fa90da3aa9cbdd6bcbef8232014ee5b78e92f3a5
                                                                                      • Instruction ID: 69c6d3a74c59ea4c3fea65869cb354491384f6e3c5f2260fc764a931bd35c448
                                                                                      • Opcode Fuzzy Hash: 16f10bb05e4ddba838739cf9fa90da3aa9cbdd6bcbef8232014ee5b78e92f3a5
                                                                                      • Instruction Fuzzy Hash: 17724F71A00119DFDB14DF64C898AADBBF6FF88304F158169E915EB2A2DB38DD42CB50
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900332592.0000000000700000.00000040.00000001.sdmp, Offset: 00700000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 61364ac90b685680cb84b5c0d7d94e0003392f03a9e13cf59850dae546f87815
                                                                                      • Instruction ID: e0b5c79248d37fbc5a20f01c97b53433141fb2291ce4f11881c40965c484f090
                                                                                      • Opcode Fuzzy Hash: 61364ac90b685680cb84b5c0d7d94e0003392f03a9e13cf59850dae546f87815
                                                                                      • Instruction Fuzzy Hash: EE621C35E007198FDB24EF78C85569DB7F1AF89304F1086A9D54AAB260EF349D85CF81
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 8^l
                                                                                      • API String ID: 0-2203279318
                                                                                      • Opcode ID: 071d82d5eef68c80c2f4f081da8dca5153ffde7943d9bf1fb2299fa60003eaa3
                                                                                      • Instruction ID: ff1101299c8f250831839e9a18d0c4eed87de654dd8255ab3f976464ec557a57
                                                                                      • Opcode Fuzzy Hash: 071d82d5eef68c80c2f4f081da8dca5153ffde7943d9bf1fb2299fa60003eaa3
                                                                                      • Instruction Fuzzy Hash: E1428230A08248CFEF24EBB8C4557ADBBA6EF86304F24C169D109AF796DB749C45CB51
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 3871246b0fc25ac7cb0c78cb1068d7f9d77a11294d13ff69458f9499a0d11ab3
                                                                                      • Instruction ID: d6297a86ff24a1dbe641f7530ec2e8a8799e3d527b16e194f3c521c4283636a6
                                                                                      • Opcode Fuzzy Hash: 3871246b0fc25ac7cb0c78cb1068d7f9d77a11294d13ff69458f9499a0d11ab3
                                                                                      • Instruction Fuzzy Hash: F3615974A00709DFDF15AFB4D8587AEB7B6BF84305F108829E406AB3A0DF399945CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900332592.0000000000700000.00000040.00000001.sdmp, Offset: 00700000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f82c0c26081d37eb4eb86eb9511acc920f55efc8e42176d32c65aba42adca15b
                                                                                      • Instruction ID: e7001e764045664768ad3ab5e3652f073160b8591ba41726337a4ea254ae0e51
                                                                                      • Opcode Fuzzy Hash: f82c0c26081d37eb4eb86eb9511acc920f55efc8e42176d32c65aba42adca15b
                                                                                      • Instruction Fuzzy Hash: 4A824C30A00609DFCB14DF68C484AAEBBF6FF49315F158699E449DB2A1D738EE41CB61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cda14fcf6d931d6eb3f341a519e74d65a127eb3973e6e3ea40ed505a64f06e93
                                                                                      • Instruction ID: 7158f1227cb3b4bb68e03a23696d911494c915aee1cc935b8a68a7d4856b5e88
                                                                                      • Opcode Fuzzy Hash: cda14fcf6d931d6eb3f341a519e74d65a127eb3973e6e3ea40ed505a64f06e93
                                                                                      • Instruction Fuzzy Hash: 97529F30B042489FDF24DBA8C894BAEBBB7AF85320F158469E115DB791CB34DD45CBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cb099808ab17c4d37db451600c1982ee8a6920f641c0d7f8bf0c5bce1d5dca95
                                                                                      • Instruction ID: d9a59e3feac681a9d2e64d21ece9004b488bfe22013e6c22d45c47f2b6729c9d
                                                                                      • Opcode Fuzzy Hash: cb099808ab17c4d37db451600c1982ee8a6920f641c0d7f8bf0c5bce1d5dca95
                                                                                      • Instruction Fuzzy Hash: A7528C30E002059FDF20DBB8C984BADB7B6BB85314F248569E415EB7A5DB34EC42CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3e0b3dd95a1a7dab35d8faaecadee7077801c4e7f1256a64bc818a194287926d
                                                                                      • Instruction ID: 32b1ae9741d778b99c87185da9329bf9d6118031fbe5a4b3dfcf37f4f3cd4916
                                                                                      • Opcode Fuzzy Hash: 3e0b3dd95a1a7dab35d8faaecadee7077801c4e7f1256a64bc818a194287926d
                                                                                      • Instruction Fuzzy Hash: 04229D70B042589FDB14DBB8D854BAEB7E2FF89304F158469E415EB392DB34DC828B91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 10f5f903f78f117cbf98722a86c55c4d6511830e41b6fd2d23141994e5847450
                                                                                      • Instruction ID: fa1ba9ef01f706f71d84843da1b78d6adcf4cf29930e2c3b0e330b17bf366a85
                                                                                      • Opcode Fuzzy Hash: 10f5f903f78f117cbf98722a86c55c4d6511830e41b6fd2d23141994e5847450
                                                                                      • Instruction Fuzzy Hash: 5622B231A016058FDB15CBA8C99375DBBFBFF82310F25519AC5058FAB1CB789941CBA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900332592.0000000000700000.00000040.00000001.sdmp, Offset: 00700000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d0f78dbbeaa146660e4a52a433416919cf8a39fe462bdb65b20c6f89d6c493aa
                                                                                      • Instruction ID: d0bd6908e1417115c747928a37dabe25422a5141461c84f78d03688ba9b0e245
                                                                                      • Opcode Fuzzy Hash: d0f78dbbeaa146660e4a52a433416919cf8a39fe462bdb65b20c6f89d6c493aa
                                                                                      • Instruction Fuzzy Hash: 5B029C31B00201DFDB14EB78D8946AE77F2EB89305F14856AE50ADB3A5DB39DD02CB52
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 41e22f1b4b724ca4c5e5286dc468e8395824669fa81cc17da203ed1dbcc8e6cd
                                                                                      • Instruction ID: a12004dc7242ccd538d618f5aaac476d26f5fc59a98a9b7298f5615e59c624a3
                                                                                      • Opcode Fuzzy Hash: 41e22f1b4b724ca4c5e5286dc468e8395824669fa81cc17da203ed1dbcc8e6cd
                                                                                      • Instruction Fuzzy Hash: 5BD19030B002145FEB28EBB488557AE76E7EFC5744F248428E11AEB795DF399C028791
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9dc2d6df82ef0603dd07b8e2bda8a9cf947c7dbcc2df9d3c0f99b36b5fe1ecb7
                                                                                      • Instruction ID: 808ff2d87742653117471a31ed675972d29fed0c9d5f100eb0547567487083f8
                                                                                      • Opcode Fuzzy Hash: 9dc2d6df82ef0603dd07b8e2bda8a9cf947c7dbcc2df9d3c0f99b36b5fe1ecb7
                                                                                      • Instruction Fuzzy Hash: 84E1ABB99847458FE719CF68E8482897BB1FBC2318F114A09D1616F2E2E7BD184ACF44
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e173a0c56be75931bdb6225d9b378e52bb0cdffde11aa5e4dbd4c0ad063a1b46
                                                                                      • Instruction ID: 1cc97c11235b40cab733f963f91a764ca5f0d6d4e57dd6d6fe11620d22882bdb
                                                                                      • Opcode Fuzzy Hash: e173a0c56be75931bdb6225d9b378e52bb0cdffde11aa5e4dbd4c0ad063a1b46
                                                                                      • Instruction Fuzzy Hash: ED12F3F9585752CBE318CF68E9482893BA1F7C1728F504B08D2612F6E1E7BD198ADF44
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 4139908857-0
                                                                                      • Opcode ID: 9a06974d04fe84f1a667bb034953692bb66a065f09a1f40cb7560e2e4406b7bf
                                                                                      • Instruction ID: d6dca408ba500d1093ee32eda6e89e79152be5eeb624a1692873976852e038e7
                                                                                      • Opcode Fuzzy Hash: 9a06974d04fe84f1a667bb034953692bb66a065f09a1f40cb7560e2e4406b7bf
                                                                                      • Instruction Fuzzy Hash: 1791CF75E1031A8FCB05DBF0C854ADDB7BAFF89308F148615E50AAF2A4DB74A941CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 4139908857-0
                                                                                      • Opcode ID: 0505950eaa102c96039afb0f6d03bd5c82c80ece68792b74095e9fcea1cfa097
                                                                                      • Instruction ID: b8707e04df62d29719afda81808c02c5f5fa5e43741b4c2a0408439bb9e03697
                                                                                      • Opcode Fuzzy Hash: 0505950eaa102c96039afb0f6d03bd5c82c80ece68792b74095e9fcea1cfa097
                                                                                      • Instruction Fuzzy Hash: B181B075E1030A8FCB05DBF0D854ADDBBBAFF8A304F148616E505AF2A4EB74A945CB50
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32 ref: 02236BB0
                                                                                      • GetCurrentThread.KERNEL32 ref: 02236BED
                                                                                      • GetCurrentProcess.KERNEL32 ref: 02236C2A
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 02236C83
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: Current$ProcessThread
                                                                                      • String ID:
                                                                                      • API String ID: 2063062207-0
                                                                                      • Opcode ID: 5d62692411b8057f802571bf5beb048081f1c96400bc8781cbd805f99fc2f28d
                                                                                      • Instruction ID: c3138dbc517b86913b5df614521df0917e933ad5d97d5bae579d0ba7201ae2c5
                                                                                      • Opcode Fuzzy Hash: 5d62692411b8057f802571bf5beb048081f1c96400bc8781cbd805f99fc2f28d
                                                                                      • Instruction Fuzzy Hash: 195166B09002499FDB51CFA9D548BEEBBF9FF88314F248459E509A7350DB34A844CF69
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8c90050e9f05f7a8da22266570a6a21df78cf042a113d0866c394da36caa68fc
                                                                                      • Instruction ID: 7a85aeb687a1e0950a4273bd4ba7ff8e5d98c656d7d4c53176d4d30577014a85
                                                                                      • Opcode Fuzzy Hash: 8c90050e9f05f7a8da22266570a6a21df78cf042a113d0866c394da36caa68fc
                                                                                      • Instruction Fuzzy Hash: 4441F572D043559FCB00DBB9D8042EEBBF1FF89320F15866AD518E7291DB789885CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02234216
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 4139908857-0
                                                                                      • Opcode ID: 370f73d25298244dab085ebc90fbc0a2f0bf9daa43313d17a24875b4f36d1d25
                                                                                      • Instruction ID: 9e4356de0e561beedfba6dbb43b3aef9300d5ef0ec21f2bbeb8d7cb8ba3b9c7e
                                                                                      • Opcode Fuzzy Hash: 370f73d25298244dab085ebc90fbc0a2f0bf9daa43313d17a24875b4f36d1d25
                                                                                      • Instruction Fuzzy Hash: FD5174B1D102498FDB10DFE8D8847DEBBF0BB48314F25816AE855AB284C3789445CF92
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 006929CC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: a82d28c1153f57cf1a665dd33c5f0846f0e5d09983948dc473f20d7bfe64ec88
                                                                                      • Instruction ID: ca3f7ab35d4ff8adbd931f6e70afeb9a471385e4467e180ba9fce6adac1f9290
                                                                                      • Opcode Fuzzy Hash: a82d28c1153f57cf1a665dd33c5f0846f0e5d09983948dc473f20d7bfe64ec88
                                                                                      • Instruction Fuzzy Hash: F14197B1E0434A9FDB00CFA9C454A8EBFF6BF49304F28806AD409AB342D7759846CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 00692C89
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: QueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3660427363-0
                                                                                      • Opcode ID: a8493be1053f82f04e891cfdb2c72539b235d5bc8d4547512ad5204d06fe4149
                                                                                      • Instruction ID: c98877bf7afc8b9d547d02aba43573cbd4e5902d5ab6292fdba1d9993b04652b
                                                                                      • Opcode Fuzzy Hash: a8493be1053f82f04e891cfdb2c72539b235d5bc8d4547512ad5204d06fe4149
                                                                                      • Instruction Fuzzy Hash: 794166B1E04249AFDF10CFA9C994B9DBBFAAF48304F15806AE809EB755D7359805CB50
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 022352A2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: CreateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 716092398-0
                                                                                      • Opcode ID: 426ca11b4c57ee0fa5800be70d9b1070185ef10a1172bd762abcc3585769bfa3
                                                                                      • Instruction ID: eaa8f1850982400c50e728a86eb5358cb86223fc509d244683b4962990ba3494
                                                                                      • Opcode Fuzzy Hash: 426ca11b4c57ee0fa5800be70d9b1070185ef10a1172bd762abcc3585769bfa3
                                                                                      • Instruction Fuzzy Hash: 5B51BFB1D10349AFDF15CFE9C884ADEBBB5BF48314F64812AE819AB214D7B49845CF90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 022352A2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: CreateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 716092398-0
                                                                                      • Opcode ID: 62651973ec136717bf1aadf7ba97314c61c9cd842f155ce4d626887d04aa05f3
                                                                                      • Instruction ID: 631639b281c0b5f39055f524d6785ef40367a5aec6db7c88c865ddd9b0faa31a
                                                                                      • Opcode Fuzzy Hash: 62651973ec136717bf1aadf7ba97314c61c9cd842f155ce4d626887d04aa05f3
                                                                                      • Instruction Fuzzy Hash: E641B2B1D103099FDF15CFD9C884ADEBBB5BF48314F64812AE819AB214D7B49845CF90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 00692C89
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: QueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3660427363-0
                                                                                      • Opcode ID: 3a0834c8ac66193dc7ea194e73c059a902cb4accfb62ea425c923e060f3c7d69
                                                                                      • Instruction ID: dcac5c0d22bb75bf50077007b39ff030318fe4fc7b361d326f69176baef09091
                                                                                      • Opcode Fuzzy Hash: 3a0834c8ac66193dc7ea194e73c059a902cb4accfb62ea425c923e060f3c7d69
                                                                                      • Instruction Fuzzy Hash: 3B4126B1D04249DFCF10CFA9D594ADEBBF6BB48304F15806AE818AB350D7749905CF90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 02237D01
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: CallProcWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2714655100-0
                                                                                      • Opcode ID: 774bde734d8fc8a888fc986081ab0a308e3f205f759b795f4203ded560ed670a
                                                                                      • Instruction ID: 2c44f5328d38eb61d36dd581a9fadc658313cdc7e6428c297a55c58b8a7f1031
                                                                                      • Opcode Fuzzy Hash: 774bde734d8fc8a888fc986081ab0a308e3f205f759b795f4203ded560ed670a
                                                                                      • Instruction Fuzzy Hash: CB415AB4A10209CFDB15CF99C488BAAFBF5FF88314F148859E519AB365D774A841CFA0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 00692C89
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: QueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3660427363-0
                                                                                      • Opcode ID: 451acb85eaa837658bf585d6ae9f3e0474198a67fb9ff08614d174ac81573d99
                                                                                      • Instruction ID: f299efbdbb07ab797a4bd277a0250df7248bba85056ab6dfd775adc779a6a42c
                                                                                      • Opcode Fuzzy Hash: 451acb85eaa837658bf585d6ae9f3e0474198a67fb9ff08614d174ac81573d99
                                                                                      • Instruction Fuzzy Hash: BD31D0B1D00259EFCF20CF9AD994ADEBBF9BB48314F15802AE819AB710D7749945CF90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: ae76ec58d6e9354a1e6148e2b9e3ed7fc7505e161f2476a323249b4db2a9a299
                                                                                      • Instruction ID: b4cc44513ca283df7982bc41e47dec3dbcce107a3c48a441e5b8db427367b20d
                                                                                      • Opcode Fuzzy Hash: ae76ec58d6e9354a1e6148e2b9e3ed7fc7505e161f2476a323249b4db2a9a299
                                                                                      • Instruction Fuzzy Hash: DF31AF30A09389DFCB06DB74C86969DBFB2FF45304F148469E006AB7A6DB35984ACB51
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 006929CC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900242174.0000000000690000.00000040.00000001.sdmp, Offset: 00690000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: 231f68ae919145a83bb4962090a9a1150f67ebb226a17f53afd8efde67fa75e2
                                                                                      • Instruction ID: f703d16ff9e81923da98f62403d1b8f736003d9406cca77bd4dc65991bc80222
                                                                                      • Opcode Fuzzy Hash: 231f68ae919145a83bb4962090a9a1150f67ebb226a17f53afd8efde67fa75e2
                                                                                      • Instruction Fuzzy Hash: 313101B1D012499FDF10CF99C584B8EFBF9BF48314F29816AE809AB351C7759885CBA4
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02236DFF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: DuplicateHandle
                                                                                      • String ID:
                                                                                      • API String ID: 3793708945-0
                                                                                      • Opcode ID: 3b3b0f33492f49047137e73ac9b1a4ca8c6f3f97de628798aa15136d0855459c
                                                                                      • Instruction ID: 19b399370414b9cc8c58325d1ad1ace297ba0c27a250166cc042f6a86bb4466a
                                                                                      • Opcode Fuzzy Hash: 3b3b0f33492f49047137e73ac9b1a4ca8c6f3f97de628798aa15136d0855459c
                                                                                      • Instruction Fuzzy Hash: 8D21B4B5D00209AFDB10CF99D584ADEBBF8EB48324F14841AE914A7311D378A955CFA5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02236DFF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: DuplicateHandle
                                                                                      • String ID:
                                                                                      • API String ID: 3793708945-0
                                                                                      • Opcode ID: 0bc976dbae3f22900f6cf270496ec6b3cc2579b71ebb24ba214cfe68105e0ce7
                                                                                      • Instruction ID: 8ab13789bb057c6e16943ce655fd153ce9fe93f99fce776a9855c3db5a5b0f51
                                                                                      • Opcode Fuzzy Hash: 0bc976dbae3f22900f6cf270496ec6b3cc2579b71ebb24ba214cfe68105e0ce7
                                                                                      • Instruction Fuzzy Hash: 7B21B3B5900209AFDB10CF9AD984ADEBBF8EB48324F14841AE914A7310D378A954CFA5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0082CE5A), ref: 0082CF47
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: GlobalMemoryStatus
                                                                                      • String ID:
                                                                                      • API String ID: 1890195054-0
                                                                                      • Opcode ID: 1d288591bf538abfd33513e408ba13e3c19c0b02a8664f667b186e574da09485
                                                                                      • Instruction ID: 9fc53f69366103a5cc5b2bb1288774bf50e71225c3835c990aa375ece5b21c9b
                                                                                      • Opcode Fuzzy Hash: 1d288591bf538abfd33513e408ba13e3c19c0b02a8664f667b186e574da09485
                                                                                      • Instruction Fuzzy Hash: B41122B1C006199BDB10CF9AD4447AEFBB4FB48264F15816AD918B7200D7B8A944CFE5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0082CE5A), ref: 0082CF47
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: GlobalMemoryStatus
                                                                                      • String ID:
                                                                                      • API String ID: 1890195054-0
                                                                                      • Opcode ID: 9f37d09ebf1a0c5849ca879b2b61ac382c9aa8e165deae1db4fcc93e7a398c8e
                                                                                      • Instruction ID: b1145d5f920d9e2d9b40eebe1b3595e068d41d604885273734d4061361113909
                                                                                      • Opcode Fuzzy Hash: 9f37d09ebf1a0c5849ca879b2b61ac382c9aa8e165deae1db4fcc93e7a398c8e
                                                                                      • Instruction Fuzzy Hash: A51136B1C006199BCB10CFAAD9447DEFBF4BF48320F05826AD524B7280D7789944CFA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RtlEncodePointer.NTDLL(00000000), ref: 0223BE72
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: EncodePointer
                                                                                      • String ID:
                                                                                      • API String ID: 2118026453-0
                                                                                      • Opcode ID: 6c59195c6ec013a5ac338077b65727bbffda646ce54f43f1baf746b525816132
                                                                                      • Instruction ID: 9b798449fe15a0bface9c0193b2878ec2be351045f48f7cfee5561c499e3d117
                                                                                      • Opcode Fuzzy Hash: 6c59195c6ec013a5ac338077b65727bbffda646ce54f43f1baf746b525816132
                                                                                      • Instruction Fuzzy Hash: 8E118EB1910305CFDB60DFA9C54879EBBF8FB48318F64882AD545E3641C7796544CFA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02234216
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 4139908857-0
                                                                                      • Opcode ID: ed207da7c8b6689ff1eb8c600c68913ff3c352bde90f1607301304b685e22074
                                                                                      • Instruction ID: e70234cdefde07a3fa8884f052cb854ca591f635587cd47d03cb167c9d217891
                                                                                      • Opcode Fuzzy Hash: ed207da7c8b6689ff1eb8c600c68913ff3c352bde90f1607301304b685e22074
                                                                                      • Instruction Fuzzy Hash: 511132B1C106498FDB10DF9AD444BDEFBF4FB88224F11856AD829B7200C3B8A545CFA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02234216
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900901110.0000000002230000.00000040.00000001.sdmp, Offset: 02230000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID: HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 4139908857-0
                                                                                      • Opcode ID: 74fb78e729b077e0d7f374dfd389095aca5121b4577cc5b7466c28f38a599a50
                                                                                      • Instruction ID: e5a607b731d897ae4285d31745e63996e7e3715287846a29dd0b4d2fc8cb22a0
                                                                                      • Opcode Fuzzy Hash: 74fb78e729b077e0d7f374dfd389095aca5121b4577cc5b7466c28f38a599a50
                                                                                      • Instruction Fuzzy Hash: 1B1120B1C002098FCB10DF9AD844BDEFBF4EF88224F11866AD869B7250C379A145CFA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900503355.000000000083D000.00000040.00000001.sdmp, Offset: 0083D000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e99b6d4bca4fb99c7bfc5d4e5a0766845efccdf7e4e4908e11f2396d31966620
                                                                                      • Instruction ID: 391aa2fc53cbb88c4cbc11a91bb0be995e39ede136c33e14374663fa2831c8f0
                                                                                      • Opcode Fuzzy Hash: e99b6d4bca4fb99c7bfc5d4e5a0766845efccdf7e4e4908e11f2396d31966620
                                                                                      • Instruction Fuzzy Hash: B22125B1504344EFDB05DF10E8C0B26BF66FBD4328F248669E9058B246C33AD856DBE1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900551104.000000000084D000.00000040.00000001.sdmp, Offset: 0084D000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: aa20a1f287db8889cbce946767d77dd0014d593a3f12dbee8b7dc041e8b5ec8d
                                                                                      • Instruction ID: b50dc80a1ab106a81fbcb2e7636876c9c952e4d4be2d5d35adcec982d050ac58
                                                                                      • Opcode Fuzzy Hash: aa20a1f287db8889cbce946767d77dd0014d593a3f12dbee8b7dc041e8b5ec8d
                                                                                      • Instruction Fuzzy Hash: 702104B5608748DFDB14CF10D8C4B26BB65FB84318F24C569E9098B346C33BD847CA61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900503355.000000000083D000.00000040.00000001.sdmp, Offset: 0083D000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 68264474273c150fb7c9e6d2dbba5de233c60d4e00ab905e4abf0992c51ff1cb
                                                                                      • Instruction ID: 887d44419d2c9ac36943bc91eb0dd26aa2352048b29ab7bdba508fe7be2b3eb7
                                                                                      • Opcode Fuzzy Hash: 68264474273c150fb7c9e6d2dbba5de233c60d4e00ab905e4abf0992c51ff1cb
                                                                                      • Instruction Fuzzy Hash: F311B176404280CFCB02CF10E9C4B56BF72FB94324F2486A9D8098B616C33AD856CBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900551104.000000000084D000.00000040.00000001.sdmp, Offset: 0084D000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a611aa9b0c6326fd15a85a78b9dd1f3d3bacf01e236ca3cebf821e8464160c7d
                                                                                      • Instruction ID: bcbeb12b26e0b55ab21004396e1b1a3d9a082e1fa83042af150a71409f6dc1f4
                                                                                      • Opcode Fuzzy Hash: a611aa9b0c6326fd15a85a78b9dd1f3d3bacf01e236ca3cebf821e8464160c7d
                                                                                      • Instruction Fuzzy Hash: 24118B75504784DFCB15CF14D5C4B15BBA2FB84324F28C6AAD8498B656C33AD84ACBA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Non-executed Functions

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D!l$j.h$j.h
                                                                                      • API String ID: 0-2910909081
                                                                                      • Opcode ID: e521ed85223ce215e872d28704b65a86525ff5c5b140d926368c3f5ee1b45662
                                                                                      • Instruction ID: 20742a1cf6291d427c9918bd689ff8ff4af9888b509878c12a016762f22128ef
                                                                                      • Opcode Fuzzy Hash: e521ed85223ce215e872d28704b65a86525ff5c5b140d926368c3f5ee1b45662
                                                                                      • Instruction Fuzzy Hash: EB03FC70D10A198FCB14EF69C89469DF7B1FF99300F15C69AE459AB261EB30AAC4CF41
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D!l$j.h$j.h
                                                                                      • API String ID: 0-2910909081
                                                                                      • Opcode ID: 0560c17d0ccc42d8834a3bca22e1112c49c5c16af7a578c601cd7320b2199e0b
                                                                                      • Instruction ID: 78f6b0fe4bd7c5eed492bfd8761f3a54d8b4c3548e3edc72c3498d392c877893
                                                                                      • Opcode Fuzzy Hash: 0560c17d0ccc42d8834a3bca22e1112c49c5c16af7a578c601cd7320b2199e0b
                                                                                      • Instruction Fuzzy Hash: CE92E770E006298FCB54EF68C89569DB7F1FF89300F1486AAD549AB251EB30AEC5CF45
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900458323.0000000000820000.00000040.00000001.sdmp, Offset: 00820000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D0l
                                                                                      • API String ID: 0-3774064344
                                                                                      • Opcode ID: 283d0f275f04faf7fcdad422d757eda045a80fe6de35b7bdbeea25edc7d72003
                                                                                      • Instruction ID: fb168dbfed43010c636286b543a0903957b51bc91cd59d8aba29b75569a801d0
                                                                                      • Opcode Fuzzy Hash: 283d0f275f04faf7fcdad422d757eda045a80fe6de35b7bdbeea25edc7d72003
                                                                                      • Instruction Fuzzy Hash: 64C1D430A04329CBCF285F65A9163ADBEB2FF88719F158529E442E7684CF74DC81DB61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900332592.0000000000700000.00000040.00000001.sdmp, Offset: 00700000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 674a540138ca70e4df8553228ac4b7a0aeebde29f76582d5e1e1d5003d36952d
                                                                                      • Instruction ID: 6b061185d9a011980330b5b6899f54781f60af93a3be4fd671b77fe4ba3b89e5
                                                                                      • Opcode Fuzzy Hash: 674a540138ca70e4df8553228ac4b7a0aeebde29f76582d5e1e1d5003d36952d
                                                                                      • Instruction Fuzzy Hash: 68021830A00219CFDB64EBB8C8557ADB7F2BF85308F1185A9D509DB2A5DF389D42CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.900332592.0000000000700000.00000040.00000001.sdmp, Offset: 00700000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 75d6fd807bff422861b2ed68c18c9ed9018373035f6cea205994bee674cb9e96
                                                                                      • Instruction ID: 19cc6a327e1d5c700cb058eca1173535b2f2c2bc7439bf150f64470121295231
                                                                                      • Opcode Fuzzy Hash: 75d6fd807bff422861b2ed68c18c9ed9018373035f6cea205994bee674cb9e96
                                                                                      • Instruction Fuzzy Hash: 9A91BD31B002019FDB24ABB9D855BAE76E6EF88744F148538E506EB3A4DF39DC018B91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Executed Functions

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: $,l
                                                                                      • API String ID: 0-3471379407
                                                                                      • Opcode ID: 7fc87a3f5e5685fedb5a0d87b41eef6685f7e5298ed7dacc9767034f5dc5a3bc
                                                                                      • Instruction ID: 837f4580df2fccfdb6b8d741cf392eac4f01757da59750ac280a33f2ea413c06
                                                                                      • Opcode Fuzzy Hash: 7fc87a3f5e5685fedb5a0d87b41eef6685f7e5298ed7dacc9767034f5dc5a3bc
                                                                                      • Instruction Fuzzy Hash: 00329235704A01CFC724EF74E8A06AA77F2EB85305B20853DC5069B3A9DB75EC82DB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e6e5c88a95230bd4ec02965d91e5129194214c4ac134a3fca3e6294dc084bf77
                                                                                      • Instruction ID: c7605b8ef971a409d6be31b843269276f9586dd9413f0188dde6393927f60908
                                                                                      • Opcode Fuzzy Hash: e6e5c88a95230bd4ec02965d91e5129194214c4ac134a3fca3e6294dc084bf77
                                                                                      • Instruction Fuzzy Hash: 0F81F331A047448FDB259F70D824ADEBBF2EF88304F158569D446AB6A2DF74ACC5DB40
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 89f30ffd2ca690cf3449ee62792d29e7be97ef8a05e28c6db43da303a0065ad5
                                                                                      • Instruction ID: a73a99515c789c5bd2c34603a0262136ef5ec60de9f3212300fc21d39e6f8a19
                                                                                      • Opcode Fuzzy Hash: 89f30ffd2ca690cf3449ee62792d29e7be97ef8a05e28c6db43da303a0065ad5
                                                                                      • Instruction Fuzzy Hash: A03128757442508FCB59AB78C468A6D37E1AF8971935609BDE442CF3B2DB36DC42CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 056c6f984640830bb5fee88b64f8bd8c1266c1554916c088ae9bfd6e2d80691f
                                                                                      • Instruction ID: a6ed9ca9a23271f3d47bf042c97b47bde37795bc7fc770d9e037680c89dc6b25
                                                                                      • Opcode Fuzzy Hash: 056c6f984640830bb5fee88b64f8bd8c1266c1554916c088ae9bfd6e2d80691f
                                                                                      • Instruction Fuzzy Hash: A321F8757102108FC758AB79C468A1D37E1AF8971935649B8E506CF372DF36EC82CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 98499f0d0139cd3b95e3450cef85d5291a9a0d1014c59ab7e2070954784b6ebd
                                                                                      • Instruction ID: bf97d11113925bb668bffee9c7374039042660fac5a80a526c025c4e2245ac8b
                                                                                      • Opcode Fuzzy Hash: 98499f0d0139cd3b95e3450cef85d5291a9a0d1014c59ab7e2070954784b6ebd
                                                                                      • Instruction Fuzzy Hash: 60110476E002458FCB00EFB8D8459EEFFF1FF89300B10866AE519AB221E7719901CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 45b985be5239786d8f4f2fe25e9b178fe92896e1a250f60e141c77f33c35bf7f
                                                                                      • Instruction ID: 9445748d4c6e6cea9eb6f3562eb006d5533c64502cbf358113859067a7453a1f
                                                                                      • Opcode Fuzzy Hash: 45b985be5239786d8f4f2fe25e9b178fe92896e1a250f60e141c77f33c35bf7f
                                                                                      • Instruction Fuzzy Hash: 4F017576E002059FCB40EFB8D8458DEFBF5FF893107108666E515AB221E771A955CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8cd5bfea5cb6321761a095d2cb998aa7c2d0452815c3df8c12942c2a12a49659
                                                                                      • Instruction ID: 2ef4ffd923f51eb346bea2dc22ef906af2b9d682adb6247fc8db73b2f7043c70
                                                                                      • Opcode Fuzzy Hash: 8cd5bfea5cb6321761a095d2cb998aa7c2d0452815c3df8c12942c2a12a49659
                                                                                      • Instruction Fuzzy Hash: 9CF06D7494E3C55FC742977859A01DD7FB0DD87220B2906EACCDAD7163D228091BDBA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9e639a082f2369ff6f85a7ca6803ba65fb5bfeb0b554357d8bb6a63b26797abc
                                                                                      • Instruction ID: 2c6d4a44bb6b58dae18804cb376e5ccfa9c7988231bc3393f900332652b23e07
                                                                                      • Opcode Fuzzy Hash: 9e639a082f2369ff6f85a7ca6803ba65fb5bfeb0b554357d8bb6a63b26797abc
                                                                                      • Instruction Fuzzy Hash: 22F09871A48205CBEB14DBA4D559BED7BF0AB48318F250859D442A72A1CBB4ADC4DB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0b7030768b4d03ba26b3ccb70804f914439d61de517f666ded23d702c0957055
                                                                                      • Instruction ID: 682041dcde9757c0f2239af6e22c5bd31005906564578b51d046eafec8ec7a2e
                                                                                      • Opcode Fuzzy Hash: 0b7030768b4d03ba26b3ccb70804f914439d61de517f666ded23d702c0957055
                                                                                      • Instruction Fuzzy Hash: 0ED012357102149FC714EB69E909A867BA8AB05611F104055E608DB294DA61DC14CBD1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000009.00000002.745496789.0000000000A10000.00000040.00000001.sdmp, Offset: 00A10000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8fa62ccc8f062d96948c396dbf7cf1b54e77f5312285fbfb0a0a5a4763789ec8
                                                                                      • Instruction ID: 3486ec0eb6f00d1d9c675cba48c2ffdba72810bdd26a947abfdd997f2824a3c1
                                                                                      • Opcode Fuzzy Hash: 8fa62ccc8f062d96948c396dbf7cf1b54e77f5312285fbfb0a0a5a4763789ec8
                                                                                      • Instruction Fuzzy Hash: 97D067B1D04229AF8B40EFB999055DEBBF8EE08250B1045A6DA19E3211E7705A509BD1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Non-executed Functions

                                                                                      Executed Functions

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: $,l
                                                                                      • API String ID: 0-3471379407
                                                                                      • Opcode ID: 9c83c4711129510196b78fd461f7bbbe19926166d44d3ca70e1c260146efb5a6
                                                                                      • Instruction ID: 8c2106d0ab75d0b1eb33089de6c3aedc55f25c0d320f330a7a564eaf73f42dda
                                                                                      • Opcode Fuzzy Hash: 9c83c4711129510196b78fd461f7bbbe19926166d44d3ca70e1c260146efb5a6
                                                                                      • Instruction Fuzzy Hash: 1B328534700612DFD72DEF74E49466A73B2FB84209B14863DD5028B399DB3AEC82CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a854ca4fd4b7f80aa3ff731a2e69cc1aaf5afa11ee3ad0b94d4b4977471ab96b
                                                                                      • Instruction ID: 1c8ce35dad0000fb1a87adf14ebb2891f66eceaba6543eff1a70746e61ed3bef
                                                                                      • Opcode Fuzzy Hash: a854ca4fd4b7f80aa3ff731a2e69cc1aaf5afa11ee3ad0b94d4b4977471ab96b
                                                                                      • Instruction Fuzzy Hash: 47312331A043558FEB2DDF64D4187DEBFB2AF48314F05866AD4026B764DB75A9C4CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 607f80f45f7e963697067317dc8533548e9014c7520aa35b3b7330dbdbcad8cd
                                                                                      • Instruction ID: 6cd25628969cf69c504834b3a92f614e5dbbb864b9aeccdb4f8b91c78812689e
                                                                                      • Opcode Fuzzy Hash: 607f80f45f7e963697067317dc8533548e9014c7520aa35b3b7330dbdbcad8cd
                                                                                      • Instruction Fuzzy Hash: 8371DE35A007458FDB2D9FB0C41869EBBF2EF88308F158629E516677A4DF75A8C1CB40
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 22459187eb0afb55c73aa2f99e331f826c79f7ed5d7365df4f517801e7922c5b
                                                                                      • Instruction ID: 2411d01fcaf0e4ee750c632ac7849c53053704ee82f41345bcc755cecebb352c
                                                                                      • Opcode Fuzzy Hash: 22459187eb0afb55c73aa2f99e331f826c79f7ed5d7365df4f517801e7922c5b
                                                                                      • Instruction Fuzzy Hash: 743129757502108FC759AB78C468A2D37E1AF9961935609BDE106CF3B2DB3ADC42CB81
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d4730863b8129fc69dd1b8c6bef2c23c1ecb308ab7cfc6d06a7386fdddb85ff1
                                                                                      • Instruction ID: c0ad411c76ab6765c5de455070697bd31290784d4e7752d7b7fe18e4cb76af12
                                                                                      • Opcode Fuzzy Hash: d4730863b8129fc69dd1b8c6bef2c23c1ecb308ab7cfc6d06a7386fdddb85ff1
                                                                                      • Instruction Fuzzy Hash: FE210A757102108FC758AB79C468A1D37E1AF8961D76609B8E106CF372DF36EC42CB81
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d6311e7e81b815f28de241ae6057c607df4cff389527278abb82266aefcdd99d
                                                                                      • Instruction ID: f3b73481ddd1077285509c52cc79b128d63bbe61be23f4f3e60065b577b400be
                                                                                      • Opcode Fuzzy Hash: d6311e7e81b815f28de241ae6057c607df4cff389527278abb82266aefcdd99d
                                                                                      • Instruction Fuzzy Hash: 6D11E176E002068FCB54EFB8D8849EEFBF1FF89314B10866AD50897221E735A940CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a3412e80b9cd85b005b0c03db0d3ce5b01baee2be04ef9c0ea658d8502845d90
                                                                                      • Instruction ID: a645db9a201d18b2f6a72162bd060c6e21e4988768aa79a9767a388236a059bb
                                                                                      • Opcode Fuzzy Hash: a3412e80b9cd85b005b0c03db0d3ce5b01baee2be04ef9c0ea658d8502845d90
                                                                                      • Instruction Fuzzy Hash: BB01B136E002169FCB44EFB9D8448AEFBF5FF893047108666E61497220EB35A955CB80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 61945f96499f1982f69090f13f15a1c1d8fbd805bfcb8ddd90aa5dbc0c9beedf
                                                                                      • Instruction ID: 3d89d462317c27c4a7f00e0490dcb0bcc317edf1aa9f2165a43bf6010ff211d2
                                                                                      • Opcode Fuzzy Hash: 61945f96499f1982f69090f13f15a1c1d8fbd805bfcb8ddd90aa5dbc0c9beedf
                                                                                      • Instruction Fuzzy Hash: 11F09671D0936A9FC7519B78A9021DD7FF0AE46310B1146F7C485DB612D3344E05CB93
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 86fa30116fc2133c8e0105b20cd9eff939e8ded2b84b901e23e76e48a44b64aa
                                                                                      • Instruction ID: a020be0673ff02296c61fc80d80c1176e9d5c3cb3d66f334893580a461499fb7
                                                                                      • Opcode Fuzzy Hash: 86fa30116fc2133c8e0105b20cd9eff939e8ded2b84b901e23e76e48a44b64aa
                                                                                      • Instruction Fuzzy Hash: 77F01C70A04705CFEB28DF64C1587AE7BF0AB4C218F250869E512A7795CBB4A984CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7fa20f077786014d33e2c0aee2caff9e1f10ff68006a08f44fc6d3cec8b6978f
                                                                                      • Instruction ID: 2fd7f187cfb6278680bd6898762a96e6d960c789ac0eaec50c21b6afa6cda428
                                                                                      • Opcode Fuzzy Hash: 7fa20f077786014d33e2c0aee2caff9e1f10ff68006a08f44fc6d3cec8b6978f
                                                                                      • Instruction Fuzzy Hash: 37D05B357002249FD724EB79E909A457BB8EF05615F114165E604CB3A4DB72DC14CBD1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000D.00000002.762094877.00000000011D0000.00000040.00000001.sdmp, Offset: 011D0000, based on PE: false
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6178dd6cec1e86bef27d9030b13ddb7d6c6e21e933ce6ced786c935706a5e4fd
                                                                                      • Instruction ID: 24634d05db34e81f2b3686df64f3a8bf3c1ec3144ac9f8461ced6b54901057ef
                                                                                      • Opcode Fuzzy Hash: 6178dd6cec1e86bef27d9030b13ddb7d6c6e21e933ce6ced786c935706a5e4fd
                                                                                      • Instruction Fuzzy Hash: 8AD067B1D04229AF8B54EFBD99055DEBBF8EA08250F1145B6D919E3204E7745A108BE1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Non-executed Functions