Loading ...

Play interactive tourEdit tour

Analysis Report ORDER.exe

Overview

General Information

Sample Name:ORDER.exe
Analysis ID:323803
MD5:47af288ac4776f74b6460c0af541c859
SHA1:fbe1cb1497f614494ea8ba10f4f26110203f06ae
SHA256:e75f2e899377c5313dd3cee3ed9d8ac7e84267656656c5b9eaaee23ec50b5ab8
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • ORDER.exe (PID: 4356 cmdline: 'C:\Users\user\Desktop\ORDER.exe' MD5: 47AF288AC4776F74B6460C0AF541C859)
    • schtasks.exe (PID: 5988 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • ORDER.exe (PID: 4396 cmdline: {path} MD5: 47AF288AC4776F74B6460C0AF541C859)
  • kprUEGC.exe (PID: 6572 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 47AF288AC4776F74B6460C0AF541C859)
    • schtasks.exe (PID: 6648 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • kprUEGC.exe (PID: 6764 cmdline: {path} MD5: 47AF288AC4776F74B6460C0AF541C859)
  • kprUEGC.exe (PID: 6928 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 47AF288AC4776F74B6460C0AF541C859)
    • schtasks.exe (PID: 5532 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • kprUEGC.exe (PID: 4416 cmdline: {path} MD5: 47AF288AC4776F74B6460C0AF541C859)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "bd8LsJGQ5M", "URL: ": "http://5WnFQTEnuc.com", "To: ": "weavingacc1@vasudeva.in", "ByHost: ": "mail.vasudeva.in:587", "Password: ": "mX3Cmv5", "From: ": "weavingacc1@vasudeva.in"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 23 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.ORDER.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              17.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                22.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: Scheduled temp file as task from temp locationShow sources
                  Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\ORDER.exe' , ParentImage: C:\Users\user\Desktop\ORDER.exe, ParentProcessId: 4356, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp', ProcessId: 5988

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: ORDER.exe.4396.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "bd8LsJGQ5M", "URL: ": "http://5WnFQTEnuc.com", "To: ": "weavingacc1@vasudeva.in", "ByHost: ": "mail.vasudeva.in:587", "Password: ": "mX3Cmv5", "From: ": "weavingacc1@vasudeva.in"}
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeReversingLabs: Detection: 72%
                  Source: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeReversingLabs: Detection: 72%
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: ORDER.exeVirustotal: Detection: 70%Perma Link
                  Source: ORDER.exeReversingLabs: Detection: 72%
                  Machine Learning detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeJoe Sandbox ML: detected
                  Machine Learning detection for sampleShow sources
                  Source: ORDER.exeJoe Sandbox ML: detected
                  Source: 3.2.ORDER.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 17.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 22.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 4x nop then jmp 0993A824h0_2_09939A71
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 4x nop then jmp 06ABA824h18_2_06AB9A71

                  Networking:

                  barindex
                  Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                  Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49728 -> 68.233.236.158:587
                  May check the online IP address of the machineShow sources
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficTCP traffic: 192.168.2.5:49728 -> 68.233.236.158:587
                  Source: Joe Sandbox ViewIP Address: 54.243.164.148 54.243.164.148
                  Source: Joe Sandbox ViewIP Address: 54.243.164.148 54.243.164.148
                  Source: Joe Sandbox ViewIP Address: 68.233.236.158 68.233.236.158
                  Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: global trafficTCP traffic: 192.168.2.5:49728 -> 68.233.236.158:587
                  Source: unknownDNS traffic detected: queries for: g.msn.com
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: ORDER.exe, 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmpString found in binary or memory: http://5WnFQTEnuc.com
                  Source: ORDER.exe, 00000003.00000003.464804013.0000000001424000.00000004.00000001.sdmpString found in binary or memory: http://5WnFQTEnuc.com1-5-21-3853321935-2125563209-4053062332-1002_Classes
                  Source: kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://RKhkfz.com
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: ORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpString found in binary or memory: http://mail.vasudeva.in
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: ORDER.exe, 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: ORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpString found in binary or memory: http://vasudeva.in
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coml1
                  Source: ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.como
                  Source: ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comoD
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                  Source: kprUEGC.exe, 0000000D.00000002.332685562.0000000000D08000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  Spam, unwanted Advertisements and Ransom Demands:

                  barindex
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  System Summary:

                  barindex
                  Initial sample is a PE file and has a suspicious nameShow sources
                  Source: initial sampleStatic PE information: Filename: ORDER.exe
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0166C1640_2_0166C164
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0166E5A00_2_0166E5A0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0166E5B00_2_0166E5B0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09939A710_2_09939A71
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09937ED20_2_09937ED2
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09938AF00_2_09938AF0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09935FA00_2_09935FA0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09937F0D0_2_09937F0D
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0993413A0_2_0993413A
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_099383A30_2_099383A3
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_055947A03_2_055947A0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_055947103_2_05594710
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_055947303_2_05594730
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06366C683_2_06366C68
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_063694F83_2_063694F8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_063675383_2_06367538
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636B0E83_2_0636B0E8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_063669203_2_06366920
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06364D743_2_06364D74
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636F04C3_2_0636F04C
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0675DFF03_2_0675DFF0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06756C683_2_06756C68
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_067514803_2_06751480
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_067543383_2_06754338
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0675D4403_2_0675D440
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_067562903_2_06756290
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_067543303_2_06754330
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_011CC16413_2_011CC164
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_011CE5B013_2_011CE5B0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_011CE5A013_2_011CE5A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_012747A017_2_012747A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_01273E4A17_2_01273E4A
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_0127473A17_2_0127473A
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_0127D82017_2_0127D820
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E9753817_2_05E97538
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E994F817_2_05E994F8
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E9692017_2_05E96920
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E96C6817_2_05E96C68
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_027EC16418_2_027EC164
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_027EE5B018_2_027EE5B0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_027EE5A018_2_027EE5A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB7ED218_2_06AB7ED2
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB9A7118_2_06AB9A71
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB5FA018_2_06AB5FA0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB5F9118_2_06AB5F91
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB7F0D18_2_06AB7F0D
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB8AF018_2_06AB8AF0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB83A318_2_06AB83A3
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB413A18_2_06AB413A
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXfhzKePuGoesTHRxzhWZClzMzrsKfKQYJFA.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmpBinary or memory string: OriginalFilename, vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.261638170.000000000A0B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.261638170.000000000A0B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.255803526.000000000409A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.261453991.0000000009FB0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.514591806.0000000006D40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.502850969.0000000000FC8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000000.252413820.0000000000E34000.00000002.00020000.sdmpBinary or memory string: OriginalFilename, vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.514320127.0000000006930000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameXfhzKePuGoesTHRxzhWZClzMzrsKfKQYJFA.exe4 vs ORDER.exe
                  Source: ORDER.exeBinary or memory string: OriginalFilename, vs ORDER.exe
                  Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: yqoevzHDNPFH.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: kprUEGC.exe.3.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@18/10@5/2
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5412:120:WilError_01
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMutant created: \Sessions\1\BaseNamedObjects\YUxgLPKrpvPvPUpXipUEXayi
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6656:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2924:120:WilError_01
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8EFE.tmpJump to behavior
                  Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: ORDER.exeVirustotal: Detection: 70%
                  Source: ORDER.exeReversingLabs: Detection: 72%
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\ORDER.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe 'C:\Users\user\Desktop\ORDER.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: ORDER.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                  Data Obfuscation:

                  barindex
                  .NET source code contains potential unpackerShow sources
                  Source: ORDER.exe, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: yqoevzHDNPFH.exe.0.dr, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.2.ORDER.exe.c30000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.0.ORDER.exe.c30000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: kprUEGC.exe.3.dr, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 3.0.ORDER.exe.d90000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 3.2.ORDER.exe.d90000.1.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 13.2.kprUEGC.exe.670000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 13.0.kprUEGC.exe.670000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.kprUEGC.exe.8a0000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.kprUEGC.exe.8a0000.1.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 18.0.kprUEGC.exe.4b0000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 18.2.kprUEGC.exe.4b0000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 22.2.kprUEGC.exe.980000.1.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 22.0.kprUEGC.exe.980000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09936636 push es; retf 0_2_09936637
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09933665 pushad ; ret 0_2_09933666
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636A61F push es; iretd 3_2_0636A63C
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06368513 push es; ret 3_2_06368550
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06368540 push es; ret 3_2_06368550
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06758F6B push es; ret 3_2_06758F6C
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_0127473A pushad ; retf 8303h17_2_012747E8
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB6636 push es; retf 18_2_06AB6637
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB3665 pushad ; ret 18_2_06AB3666
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8367973888
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8367973888
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8367973888
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeJump to dropped file
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM_3Show sources
                  Source: Yara matchFile source: 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4356, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6572, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: ORDER.exe, 00000000.00000002.254519534.00000000030F6000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.334132126.0000000002A46000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: ORDER.exe, 00000000.00000002.254519534.00000000030F6000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.334132126.0000000002A46000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06361B08 rdtsc 3_2_06361B08
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 408Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 4328Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 963Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 8895Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 734Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 4181Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 820Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 4880Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 1744
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 1524
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 2135
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 7709
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 5496Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 4756Thread sleep time: -41500s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 4596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3336Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3900Thread sleep time: -12912720851596678s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3752Thread sleep count: 963 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3752Thread sleep count: 8895 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6608Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6576Thread sleep time: -41500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5564Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 4632Thread sleep count: 820 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 4632Thread sleep count: 4880 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 7028Thread sleep time: -10145709240540247s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6932Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6976Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6416Thread sleep time: -24903104499507879s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6412Thread sleep count: 2135 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6412Thread sleep count: 7709 > 30
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: ORDER.exe, 00000000.00000002.253957697.000000000142A000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06361B08 rdtsc 3_2_06361B08
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636CE1E LdrInitializeThunk,KiUserExceptionDispatcher,KiUserExceptionDispatcher,KiUserExceptionDispatcher,3_2_0636CE1E
                  Source: C:\Users\user\Desktop\ORDER.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\ORDER.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Injects a PE file into a foreign processesShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeMemory written: C:\Users\user\Desktop\ORDER.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMemory written: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe base: 400000 value starts with: 4D5A
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Users\user\Desktop\ORDER.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Users\user\Desktop\ORDER.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636516C GetUserNameW,3_2_0636516C
                  Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings:

                  barindex
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6764, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4396, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4356, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4416, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6572, type: MEMORY
                  Source: Yara matchFile source: 3.2.ORDER.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6764, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4396, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4416, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6764, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4396, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4356, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4416, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6572, type: MEMORY
                  Source: Yara matchFile source: 3.2.ORDER.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Disable or Modify Tools1Input Capture1File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information3Credentials in Registry1System Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSQuery Registry1Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery331SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsVirtualization/Sandbox Evasion14VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureSystem Network Configuration Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 323803 Sample: ORDER.exe Startdate: 27/11/2020 Architecture: WINDOWS Score: 100 55 g.msn.com 2->55 65 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->65 67 Found malware configuration 2->67 69 Multi AV Scanner detection for dropped file 2->69 71 11 other signatures 2->71 8 ORDER.exe 6 2->8         started        12 kprUEGC.exe 5 2->12         started        14 kprUEGC.exe 2->14         started        signatures3 process4 file5 43 C:\Users\user\AppData\...\yqoevzHDNPFH.exe, PE32 8->43 dropped 45 C:\Users\user\AppData\Local\...\tmp8EFE.tmp, XML 8->45 dropped 47 C:\Users\user\AppData\Local\...\ORDER.exe.log, ASCII 8->47 dropped 73 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->73 75 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 8->75 77 Injects a PE file into a foreign processes 8->77 16 ORDER.exe 17 5 8->16         started        21 schtasks.exe 1 8->21         started        79 Multi AV Scanner detection for dropped file 12->79 81 Machine Learning detection for dropped file 12->81 23 schtasks.exe 1 12->23         started        25 kprUEGC.exe 2 12->25         started        27 kprUEGC.exe 14->27         started        29 schtasks.exe 14->29         started        signatures6 process7 dnsIp8 49 vasudeva.in 68.233.236.158, 49728, 587 HVC-ASUS United States 16->49 51 mail.vasudeva.in 16->51 53 3 other IPs or domains 16->53 37 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 16->37 dropped 39 C:\Users\user\...\kprUEGC.exe:Zone.Identifier, ASCII 16->39 dropped 57 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->57 59 Tries to steal Mail credentials (via file access) 16->59 61 Tries to harvest and steal ftp login credentials 16->61 63 3 other signatures 16->63 31 conhost.exe 21->31         started        33 conhost.exe 23->33         started        41 C:\Windows\System32\drivers\etc\hosts, ASCII 27->41 dropped 35 conhost.exe 29->35         started        file9 signatures10 process11

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  ORDER.exe70%VirustotalBrowse
                  ORDER.exe73%ReversingLabsByteCode-MSIL.Backdoor.Androm
                  ORDER.exe100%Joe Sandbox ML

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe73%ReversingLabsByteCode-MSIL.Backdoor.Androm
                  C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exe73%ReversingLabsByteCode-MSIL.Backdoor.Androm

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  3.2.ORDER.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  17.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  22.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://RKhkfz.com0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://5WnFQTEnuc.com1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.fontbureau.coml10%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://mail.vasudeva.in0%Avira URL Cloudsafe
                  http://5WnFQTEnuc.com0%Avira URL Cloudsafe
                  http://www.fontbureau.comoD0%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://vasudeva.in0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  elb097307-934924932.us-east-1.elb.amazonaws.com
                  54.243.164.148
                  truefalse
                    high
                    vasudeva.in
                    68.233.236.158
                    truetrue
                      unknown
                      mail.vasudeva.in
                      unknown
                      unknowntrue
                        unknown
                        g.msn.com
                        unknown
                        unknownfalse
                          high
                          api.ipify.org
                          unknown
                          unknownfalse
                            high

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpfalse
                              high
                              http://127.0.0.1:HTTP/1.1ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.apache.org/licenses/LICENSE-2.0ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                    high
                                    http://DynDns.comDynDNSkprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/?ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bTheORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://RKhkfz.comkprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers?ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.tiro.comkprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designerskprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          high
                                          http://5WnFQTEnuc.com1-5-21-3853321935-2125563209-4053062332-1002_ClassesORDER.exe, 00000003.00000003.464804013.0000000001424000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          http://www.goodfont.co.krORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.coml1ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.carterandcone.comlORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.orgGETMozilla/5.0kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cTheORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://api.ipify.orgORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpfalse
                                              high
                                              http://fontfabrik.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.founder.com.cn/cnORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://mail.vasudeva.inORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers/frere-jones.htmlORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                high
                                                http://5WnFQTEnuc.comORDER.exe, 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://api.telegram.org/bot%telegramapi%/ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comoDORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comoORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://vasudeva.inORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/DPleaseORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.fonts.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      high
                                                      http://www.sandoll.co.krORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.urwpp.deDPleaseORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.zhongyicts.com.cnORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER.exe, 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.sakkal.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://secure.comodo.com/CPS0ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown

                                                            Contacted IPs

                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs

                                                            Public

                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            54.243.164.148
                                                            unknownUnited States
                                                            14618AMAZON-AESUSfalse
                                                            68.233.236.158
                                                            unknownUnited States
                                                            29802HVC-ASUStrue

                                                            General Information

                                                            Joe Sandbox Version:31.0.0 Red Diamond
                                                            Analysis ID:323803
                                                            Start date:27.11.2020
                                                            Start time:15:20:20
                                                            Joe Sandbox Product:CloudBasic
                                                            Overall analysis duration:0h 12m 33s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Sample file name:ORDER.exe
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                            Number of analysed new started processes analysed:29
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • HDC enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Detection:MAL
                                                            Classification:mal100.troj.adwa.spyw.evad.winEXE@18/10@5/2
                                                            EGA Information:Failed
                                                            HDC Information:
                                                            • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                                            • Quality average: 48.8%
                                                            • Quality standard deviation: 36.1%
                                                            HCA Information:
                                                            • Successful, ratio: 99%
                                                            • Number of executed functions: 160
                                                            • Number of non-executed functions: 7
                                                            Cookbook Comments:
                                                            • Adjust boot time
                                                            • Enable AMSI
                                                            • Found application associated with file extension: .exe
                                                            Warnings:
                                                            Show All
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                            • Excluded IPs from analysis (whitelisted): 104.79.90.110, 51.11.168.160, 20.54.26.129, 2.20.142.209, 2.20.142.210, 51.103.5.186, 51.104.139.180, 52.142.114.176, 92.122.213.247, 92.122.213.194
                                                            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, client.wns.windows.com, fs.microsoft.com, arc.msn.com.nsatc.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, ris.api.iris.microsoft.com, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.

                                                            Simulations

                                                            Behavior and APIs

                                                            TimeTypeDescription
                                                            15:21:18API Interceptor788x Sleep call for process: ORDER.exe modified
                                                            15:21:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                            15:21:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                            15:21:55API Interceptor522x Sleep call for process: kprUEGC.exe modified

                                                            Joe Sandbox View / Context

                                                            IPs

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            54.243.164.148Sulfasalazine-Granule.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            vQau1zZe6u.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            B2gnon0xfg.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            Shipping-Document.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            1119_673423.docGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            Rewgjqjhqwqn8.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            i3gRY0HYZn.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/?format=xml
                                                            mWKfVsuSZAHcuCc.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            Catalogue.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            68.233.236.158ORDER.exeGet hashmaliciousBrowse
                                                              TT COPY.exeGet hashmaliciousBrowse
                                                                TT COPY.exeGet hashmaliciousBrowse
                                                                  TT COPY.exeGet hashmaliciousBrowse
                                                                    New order 20001789.exeGet hashmaliciousBrowse
                                                                      ORD002344536.exeGet hashmaliciousBrowse
                                                                        ORD002344536.exeGet hashmaliciousBrowse
                                                                          bank slip.exeGet hashmaliciousBrowse
                                                                            PO#ZT20-09.exeGet hashmaliciousBrowse

                                                                              Domains

                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                              elb097307-934924932.us-east-1.elb.amazonaws.comswift copy.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.220.115
                                                                              Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              lxpo.exeGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              guy1.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              guy2.exeGet hashmaliciousBrowse
                                                                              • 54.243.161.145
                                                                              PO_0012009.xlsxGet hashmaliciousBrowse
                                                                              • 23.21.252.4
                                                                              5C.exeGet hashmaliciousBrowse
                                                                              • 54.225.169.28
                                                                              INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              #A06578987.xlsmGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              SecuriteInfo.com.Variant.Bulz.233365.3916.exeGet hashmaliciousBrowse
                                                                              • 23.21.252.4
                                                                              https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                                                              • 54.225.169.28
                                                                              INVOICE.xlsxGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              Inquiry_pdf.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              98650107.pdf.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              1125_56873981.docGet hashmaliciousBrowse
                                                                              • 54.243.161.145
                                                                              yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                                                              • 54.235.142.93
                                                                              ER mexico.exeGet hashmaliciousBrowse
                                                                              • 54.235.83.248

                                                                              ASN

                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                              AMAZON-AESUSswift copy.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.220.115
                                                                              Direct Deposit.xlsxGet hashmaliciousBrowse
                                                                              • 34.231.129.212
                                                                              Direct Deposit.xlsxGet hashmaliciousBrowse
                                                                              • 52.205.236.122
                                                                              https://is.gd/NLY8SbGet hashmaliciousBrowse
                                                                              • 35.174.78.146
                                                                              Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              guy1.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              guy2.exeGet hashmaliciousBrowse
                                                                              • 54.243.161.145
                                                                              https://34.75.2o2.lol/XYWNc0aW9uPWwNsaWNrJngVybD1ovndHRwnczovL3NleY3wVyZWQtbG9naW4ubmV0nL3BhZ2VzLzQyY2FkNTJhZmU3YSZyZWNpcGllbnRfaWQ9NzM2OTg3ODg4JmNhbXBhaWduX3J1bl9pZD0zOTM3OTczGet hashmaliciousBrowse
                                                                              • 3.215.226.95
                                                                              https://bit.do/fLpprGet hashmaliciousBrowse
                                                                              • 54.83.52.76
                                                                              PO_0012009.xlsxGet hashmaliciousBrowse
                                                                              • 23.21.252.4
                                                                              https://webnavigator.co/?adprovider=AppFocus1&source=d-cp11560482685&group=cg60&device=c&keyword=&creative=477646941053&adposition=none&placement=www.123homeschool4me.com&target=segment_be_a_7802457135858218830&sl=&caid=11560482685&gw=1&test=%3a%2f%2fmailGet hashmaliciousBrowse
                                                                              • 54.90.26.145
                                                                              https://m365.eu.vadesecure.com/safeproxy/v4?f=xQsVwKRZoQHMcJWN90zqnir6G6pZJkmZJBUJoNEfoN5w0NIk94-OeCH1NldcAqKsz75KalR9dIZlPCJr1Ux0xQ&i=dKwbScfh0hAXC0Inkkq0sM5FeXPK9I7Ny4D2nAPOiEibKJwP2etJDqX8WzAoEu0mklzE6wT-r8I8OtTRdIg8Sg&k=EPqM&r=_vxI1MPLJP9RjHYc6dmEH2aQYLnm7iSEcU9gx_WNg2_vrJo8MeAqNzNCqHX9DNrQ&s=dbc75c7ed54466f34eeae3fd3b1612b20fb815efc99933570f78acd79467623c&u=https%3A%2F%2Femail.utest.com%2Fls%2Fclick%3Fupn%3DlGjzeq3i4yih7CYyWDD2uGWEioaO303Ya1CTzgGY6ZFHmgV-2FF-2FEWXdAYvLiLIvET2r-2BfuQ5qIL56xFMZkA-2F-2BXKhuWb2hSemZwMxFmG0rDjjP9tlrcROzWmQSAh2kMQamb79I1cx4-2Fvjhww3n8oZQi-2FnOhlQdbGdNxKrX28q7P-2FPufa0AAvr-2FvNJcD-2FrxpMHjDG9dPJU0WEGqi12uVZQLCz-2BjYAJF5yCzK-2FjUezEn2d6sv-2BTETl96ejjfG9yQ2VbdWqGp_snpiKdUCY2bDrEnMsWMAnz6f3HkWPd0oUIj3WsKz0V4NahNEm-2BJ9rDW2-2Fib8wsclxoRuHsrv-2B0aoCVw0ftXwGZJTPgQ4k6DZXQjAqFeejOYe-2FRbaSc1Yf5Xj5PUa6lKqmFYNWSkevePONwyMaBGxV4NDGtgMbAc7jyOEWYDUniHPiY87Lpiw631423FED14OvXIfrL7S45QvDvK6-2Fc04r-2B65lMxyCebYSr-2FOr4bCpGQ-3DGet hashmaliciousBrowse
                                                                              • 52.202.11.207
                                                                              https://webmail-re5rere.web.app/?emailtoken=test@test.com&domain=test.comGet hashmaliciousBrowse
                                                                              • 34.236.142.3
                                                                              5C.exeGet hashmaliciousBrowse
                                                                              • 54.225.169.28
                                                                              INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              #A06578987.xlsmGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              https://email.utest.com/ls/click?upn=kHi9kJ2VFJGMl00Uc0lXdd7WKRMGsOIU4g4ei1d-2FX5m1QA-2FrT8Vl5L3Fk3cMytK6G9se1iMMnmCZDn1xIdrYiQ1p-2FwcQpvha0Cl5oPF0v81y5hgAsim7OqaA63T8LZn1UUJIEgydRUHiWwDj8GYDCxqGnV0O0rI4O7I6kSKWwA2QN6GRUB5jtLYkPnKAtjOoUgEhfuSimn9pHS78TURJ3gh4c37fJ5SLcFsdSMlL5cSNM599TAmyU83RYL5vT6LiS59Z_K8t8bbLaByOBk98eoL7OiHjGcOStuW9cK4Z47GjL3LOg6J63-2FMkWRpNoPmcLIu18HCMEgODcyx-2FUvVhPVIvmHjzJiqJBCjoeBbWoJaKrxsvgnkh140XYi8oSb4fB3DPwhOq9ho1ZQ40V7Ij7E76nndroD8i7Zx6K9k23tLqOPU-2BI4uv4B0Gy5ZNEnpZd7wg2RXwXNiQ76annNuw-2BlzoA5-2FGihgJE5sZwqDaPnA1XR7c-3DGet hashmaliciousBrowse
                                                                              • 52.202.11.207
                                                                              http://pma.climabitus.com/undercook.phpGet hashmaliciousBrowse
                                                                              • 23.20.225.204
                                                                              https://brechi5.wixsite.com/owa-webmail-updatesGet hashmaliciousBrowse
                                                                              • 52.2.188.208
                                                                              HVC-ASUSdocument-1929478857.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1929478857.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1868465862.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1868465862.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1860007818.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1860007818.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1791880561.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1791880561.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1890968008.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1890968008.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1843971239.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1843971239.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1816868979.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1816868979.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1819493086.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1819493086.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1772046145.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1772046145.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1766635086.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1766635086.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154

                                                                              JA3 Fingerprints

                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                              3b5074b1b5d032e5620f69f9f700ff0eMixtec New Order And Price List Requsting Form_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              swift copy.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              SecuriteInfo.com.Mal.Generic-S.26042.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              guy1.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              guy2.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Exodus.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              #A06578987.xlsmGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Order 51897.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              98650107.pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Izezma64.dllGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              fuxenm32.dllGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              http://ancien-site-joomla.fr/build2.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              ER mexico.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148

                                                                              Dropped Files

                                                                              No context

                                                                              Created / dropped Files

                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER.exe.log
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1301
                                                                              Entropy (8bit):5.345637324625647
                                                                              Encrypted:false
                                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                              MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                              SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                              SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                              SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                              Malicious:true
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1301
                                                                              Entropy (8bit):5.345637324625647
                                                                              Encrypted:false
                                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                              MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                              SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                              SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                              SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                              Malicious:false
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                              C:\Users\user\AppData\Local\Temp\tmp103F.tmp
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1649
                                                                              Entropy (8bit):5.180961141461008
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBRBtn:cbhC7ZlNQF/rydbz9I3YODOLNdq37T
                                                                              MD5:23866D1CF55533F8F03D9CA664595EBB
                                                                              SHA1:99B0E8C3A4F45AB85027B7C6B31F0D85852AF7E8
                                                                              SHA-256:8A247A83B13671D2580FF27C35A07A6508033F50BEE5476B1C1EEB433D13D38C
                                                                              SHA-512:E3662B0A4EC4831EF936599DBC0551BD419FEAE7A4FE60DB7642F0EAC099550411D8D237AE2AB03D78B142874E64F0E028BDEFC8A9F8CFC1C964EE83A9959FD5
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                              C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1649
                                                                              Entropy (8bit):5.180961141461008
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBRBtn:cbhC7ZlNQF/rydbz9I3YODOLNdq37T
                                                                              MD5:23866D1CF55533F8F03D9CA664595EBB
                                                                              SHA1:99B0E8C3A4F45AB85027B7C6B31F0D85852AF7E8
                                                                              SHA-256:8A247A83B13671D2580FF27C35A07A6508033F50BEE5476B1C1EEB433D13D38C
                                                                              SHA-512:E3662B0A4EC4831EF936599DBC0551BD419FEAE7A4FE60DB7642F0EAC099550411D8D237AE2AB03D78B142874E64F0E028BDEFC8A9F8CFC1C964EE83A9959FD5
                                                                              Malicious:true
                                                                              Reputation:low
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                              C:\Users\user\AppData\Local\Temp\tmpE76F.tmp
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1649
                                                                              Entropy (8bit):5.180961141461008
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBRBtn:cbhC7ZlNQF/rydbz9I3YODOLNdq37T
                                                                              MD5:23866D1CF55533F8F03D9CA664595EBB
                                                                              SHA1:99B0E8C3A4F45AB85027B7C6B31F0D85852AF7E8
                                                                              SHA-256:8A247A83B13671D2580FF27C35A07A6508033F50BEE5476B1C1EEB433D13D38C
                                                                              SHA-512:E3662B0A4EC4831EF936599DBC0551BD419FEAE7A4FE60DB7642F0EAC099550411D8D237AE2AB03D78B142874E64F0E028BDEFC8A9F8CFC1C964EE83A9959FD5
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):678912
                                                                              Entropy (8bit):7.776443345443531
                                                                              Encrypted:false
                                                                              SSDEEP:12288:YeLf4lqhmRfqawpP/o5fvrsMfcBXslFqFlVmI19rNV93sZit8LF:YejPI5bsMUBX4qFqIrr53sZu8
                                                                              MD5:47AF288AC4776F74B6460C0AF541C859
                                                                              SHA1:FBE1CB1497F614494EA8BA10F4F26110203F06AE
                                                                              SHA-256:E75F2E899377C5313DD3CEE3ED9D8AC7E84267656656C5B9EAAEE23EC50B5AB8
                                                                              SHA-512:478EDFBDA6E7416388C345E6B4DDC8903C3074A4B8296140C518277962AE18E8DE9C598936893E7976E7C3C715515EDC5B6A41B9E0CB0661151FB37DEEA2F9B7
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 73%
                                                                              Reputation:low
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E._.....................L.......,... ........@.. ....................................@..................................,..S....@...J........................................................................... ............... ..H............text........ ...................... ..`.rsrc....J...@...J..................@..@.reloc...............Z..............@..B.................,......H............o...........e...V..........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*....s....}......(......r...po.....*..j.(......(.....s....(.....*.^..}.....(.......(.....*...{.....o......{.....o......{.....o......{....o.....*...0..W.........{.....o......{....o.....d....,5..{....o......{.....o......{.....o......{.....o......*..0...........s......o....&*.".(.....*....0...........s......o....&*..0..+.........,.
                                                                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):26
                                                                              Entropy (8bit):3.95006375643621
                                                                              Encrypted:false
                                                                              SSDEEP:3:ggPYV:rPYV
                                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                              Malicious:true
                                                                              Preview: [ZoneTransfer]....ZoneId=0
                                                                              C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exe
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):678912
                                                                              Entropy (8bit):7.776443345443531
                                                                              Encrypted:false
                                                                              SSDEEP:12288:YeLf4lqhmRfqawpP/o5fvrsMfcBXslFqFlVmI19rNV93sZit8LF:YejPI5bsMUBX4qFqIrr53sZu8
                                                                              MD5:47AF288AC4776F74B6460C0AF541C859
                                                                              SHA1:FBE1CB1497F614494EA8BA10F4F26110203F06AE
                                                                              SHA-256:E75F2E899377C5313DD3CEE3ED9D8AC7E84267656656C5B9EAAEE23EC50B5AB8
                                                                              SHA-512:478EDFBDA6E7416388C345E6B4DDC8903C3074A4B8296140C518277962AE18E8DE9C598936893E7976E7C3C715515EDC5B6A41B9E0CB0661151FB37DEEA2F9B7
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 73%
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E._.....................L.......,... ........@.. ....................................@..................................,..S....@...J........................................................................... ............... ..H............text........ ...................... ..`.rsrc....J...@...J..................@..@.reloc...............Z..............@..B.................,......H............o...........e...V..........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*....s....}......(......r...po.....*..j.(......(.....s....(.....*.^..}.....(.......(.....*...{.....o......{.....o......{.....o......{....o.....*...0..W.........{.....o......{....o.....d....,5..{....o......{.....o......{.....o......{.....o......*..0...........s......o....&*.".(.....*....0...........s......o....&*..0..+.........,.
                                                                              C:\Windows\System32\drivers\etc\hosts
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):11
                                                                              Entropy (8bit):2.663532754804255
                                                                              Encrypted:false
                                                                              SSDEEP:3:iLE:iLE
                                                                              MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                              SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                              SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                              SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                              Malicious:true
                                                                              Preview: ..127.0.0.1

                                                                              Static File Info

                                                                              General

                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Entropy (8bit):7.776443345443531
                                                                              TrID:
                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                              • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:ORDER.exe
                                                                              File size:678912
                                                                              MD5:47af288ac4776f74b6460c0af541c859
                                                                              SHA1:fbe1cb1497f614494ea8ba10f4f26110203f06ae
                                                                              SHA256:e75f2e899377c5313dd3cee3ed9d8ac7e84267656656c5b9eaaee23ec50b5ab8
                                                                              SHA512:478edfbda6e7416388c345e6b4ddc8903c3074a4b8296140c518277962ae18e8de9c598936893e7976e7c3c715515edc5b6a41b9e0cb0661151fb37deea2f9b7
                                                                              SSDEEP:12288:YeLf4lqhmRfqawpP/o5fvrsMfcBXslFqFlVmI19rNV93sZit8LF:YejPI5bsMUBX4qFqIrr53sZu8
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E._.....................L.......,... ........@.. ....................................@................................

                                                                              File Icon

                                                                              Icon Hash:8eab3131292992ec

                                                                              Static PE Info

                                                                              General

                                                                              Entrypoint:0x4a2cfe
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                              Time Stamp:0x5FBC4597 [Mon Nov 23 23:28:23 2020 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:v4.0.30319
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                              Entrypoint Preview

                                                                              Instruction
                                                                              jmp dword ptr [00402000h]
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al

                                                                              Data Directories

                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa2ca80x53.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x4a00.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                              Sections

                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x20000xa0d040xa0e00False0.888439685315data7.8367973888IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                              .rsrc0xa40000x4a000x4a00False0.154666385135data2.33730323121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xaa0000xc0x200False0.041015625data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                              Resources

                                                                              NameRVASizeTypeLanguageCountry
                                                                              RT_ICON0xa41000x4228dBase III DBT, version number 0, next free block index 40
                                                                              RT_GROUP_ICON0xa83380x14data
                                                                              RT_VERSION0xa835c0x370data
                                                                              RT_MANIFEST0xa86dc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                              Imports

                                                                              DLLImport
                                                                              mscoree.dll_CorExeMain

                                                                              Version Infos

                                                                              DescriptionData
                                                                              Translation0x0000 0x04b0
                                                                              LegalCopyrightPlayer Points
                                                                              Assembly Version2.0.0.6
                                                                              InternalNameo.exe
                                                                              FileVersion2.0.0.6
                                                                              CompanyNameRoblox Corporation
                                                                              LegalTrademarksRoblox Corporation
                                                                              CommentsEE Mobile Game of the Year
                                                                              ProductNameRoblox
                                                                              ProductVersion2.0.0.6
                                                                              FileDescriptionRoblox
                                                                              OriginalFilenameo.exe

                                                                              Network Behavior

                                                                              Snort IDS Alerts

                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                              11/27/20-15:23:09.180868TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49728587192.168.2.568.233.236.158

                                                                              Network Port Distribution

                                                                              TCP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Nov 27, 2020 15:22:56.486414909 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.588777065 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.588948965 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.670232058 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.772649050 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773108006 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773139954 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773180008 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773194075 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773192883 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.773238897 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.774386883 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.813838959 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.821400881 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.923979044 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.970134020 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:57.257230043 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:57.367491007 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:57.407618046 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.048069000 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.150934935 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:23:07.150958061 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:23:07.151210070 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.151248932 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.860901117 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.004542112 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.004676104 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.282694101 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.283426046 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.427160978 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.429059982 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.573081970 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.574208021 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.735625982 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.736643076 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.880376101 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.880752087 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.034296989 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.034858942 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.178555012 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.178571939 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.180867910 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.181143045 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.181417942 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.181535006 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.324523926 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.324913979 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.326756001 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.377388954 CET49728587192.168.2.568.233.236.158

                                                                              UDP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Nov 27, 2020 15:21:27.914763927 CET6544753192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:27.952754021 CET53654478.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:32.965508938 CET5244153192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:32.992604017 CET53524418.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:52.521518946 CET6217653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:52.557221889 CET53621768.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:58.321516037 CET5959653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:58.358633041 CET53595968.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:58.377063036 CET6529653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:58.412472010 CET53652968.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:01.121975899 CET6318353192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:01.149048090 CET53631838.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:04.920420885 CET6015153192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:04.963738918 CET53601518.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:08.954406023 CET5696953192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:08.991322041 CET53569698.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:36.092958927 CET5516153192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:36.120320082 CET53551618.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:56.291981936 CET5475753192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:56.319000006 CET53547578.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:56.338557959 CET4999253192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:56.365775108 CET53499928.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:23:07.314687967 CET6007553192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:23:07.392752886 CET53600758.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:23:07.791810989 CET5501653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:23:07.858406067 CET53550168.8.8.8192.168.2.5

                                                                              DNS Queries

                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                              Nov 27, 2020 15:22:04.920420885 CET192.168.2.58.8.8.80x34c0Standard query (0)g.msn.comA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.291981936 CET192.168.2.58.8.8.80x3c7eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.338557959 CET192.168.2.58.8.8.80xf915Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.314687967 CET192.168.2.58.8.8.80xfe39Standard query (0)mail.vasudeva.inA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.791810989 CET192.168.2.58.8.8.80xf368Standard query (0)mail.vasudeva.inA (IP address)IN (0x0001)

                                                                              DNS Answers

                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                              Nov 27, 2020 15:22:04.963738918 CET8.8.8.8192.168.2.50x34c0No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.28A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.204.14.42A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.392752886 CET8.8.8.8192.168.2.50xfe39No error (0)mail.vasudeva.invasudeva.inCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.392752886 CET8.8.8.8192.168.2.50xfe39No error (0)vasudeva.in68.233.236.158A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.858406067 CET8.8.8.8192.168.2.50xf368No error (0)mail.vasudeva.invasudeva.inCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.858406067 CET8.8.8.8192.168.2.50xf368No error (0)vasudeva.in68.233.236.158A (IP address)IN (0x0001)

                                                                              HTTPS Packets

                                                                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                              Nov 27, 2020 15:22:56.774386883 CET54.243.164.148443192.168.2.549727CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                              CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                                                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                                                              SMTP Packets

                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                              Nov 27, 2020 15:23:08.282694101 CET5874972868.233.236.158192.168.2.5220-cherry.herosite.pro ESMTP Exim 4.93 #2 Fri, 27 Nov 2020 09:23:08 -0500
                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                              220 and/or bulk e-mail.
                                                                              Nov 27, 2020 15:23:08.283426046 CET49728587192.168.2.568.233.236.158EHLO 980108
                                                                              Nov 27, 2020 15:23:08.427160978 CET5874972868.233.236.158192.168.2.5250-cherry.herosite.pro Hello 980108 [84.17.52.25]
                                                                              250-SIZE 52428800
                                                                              250-8BITMIME
                                                                              250-PIPELINING
                                                                              250-AUTH PLAIN LOGIN
                                                                              250-STARTTLS
                                                                              250 HELP
                                                                              Nov 27, 2020 15:23:08.429059982 CET49728587192.168.2.568.233.236.158AUTH login d2VhdmluZ2FjYzFAdmFzdWRldmEuaW4=
                                                                              Nov 27, 2020 15:23:08.573081970 CET5874972868.233.236.158192.168.2.5334 UGFzc3dvcmQ6
                                                                              Nov 27, 2020 15:23:08.735625982 CET5874972868.233.236.158192.168.2.5235 Authentication succeeded
                                                                              Nov 27, 2020 15:23:08.736643076 CET49728587192.168.2.568.233.236.158MAIL FROM:<weavingacc1@vasudeva.in>
                                                                              Nov 27, 2020 15:23:08.880376101 CET5874972868.233.236.158192.168.2.5250 OK
                                                                              Nov 27, 2020 15:23:08.880752087 CET49728587192.168.2.568.233.236.158RCPT TO:<weavingacc1@vasudeva.in>
                                                                              Nov 27, 2020 15:23:09.034296989 CET5874972868.233.236.158192.168.2.5250 Accepted
                                                                              Nov 27, 2020 15:23:09.034858942 CET49728587192.168.2.568.233.236.158DATA
                                                                              Nov 27, 2020 15:23:09.178571939 CET5874972868.233.236.158192.168.2.5354 Enter message, ending with "." on a line by itself
                                                                              Nov 27, 2020 15:23:09.181535006 CET49728587192.168.2.568.233.236.158.
                                                                              Nov 27, 2020 15:23:09.326756001 CET5874972868.233.236.158192.168.2.5250 OK id=1kieeT-001aiV-3J

                                                                              Code Manipulations

                                                                              Statistics

                                                                              CPU Usage

                                                                              Click to jump to process

                                                                              Memory Usage

                                                                              Click to jump to process

                                                                              High Level Behavior Distribution

                                                                              Click to dive into process behavior distribution

                                                                              Behavior

                                                                              Click to jump to process

                                                                              System Behavior

                                                                              General

                                                                              Start time:15:21:12
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\Desktop\ORDER.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\Desktop\ORDER.exe'
                                                                              Imagebase:0xc30000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:21:20
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                                                                              Imagebase:0x9e0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:21
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7ecfc0000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:21
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\Desktop\ORDER.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0xd90000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:21:53
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                              Imagebase:0x670000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              • Detection: 73%, ReversingLabs
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:21:57
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'
                                                                              Imagebase:0x9e0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:57
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7ecfc0000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:58
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0x8a0000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:22:01
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                              Imagebase:0x4b0000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:22:08
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                                                                              Imagebase:0x9e0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:22:08
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7ecfc0000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:22:09
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0x980000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              Disassembly

                                                                              Code Analysis

                                                                              Reset < >

                                                                                Executed Functions

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ($C$G$LC
                                                                                • API String ID: 0-3426766129
                                                                                • Opcode ID: 9615e6c1a655497f120c2611a13133c0a64e429397ae3506c42f5b1e82e399fa
                                                                                • Instruction ID: 8b907b87439ac9c61c5cb39021623b00727e937a9172b38d6f7a996568ecee88
                                                                                • Opcode Fuzzy Hash: 9615e6c1a655497f120c2611a13133c0a64e429397ae3506c42f5b1e82e399fa
                                                                                • Instruction Fuzzy Hash: 3D72DF70D06229CFDB24DF64C984BEDB7B5AB8A308F9085EAD049A7291DB745EC5CF40
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: C$G
                                                                                • API String ID: 0-2496519966
                                                                                • Opcode ID: 352c09d5f53d13216435241376a7765f4291fdcb6e8141ac56646f5277de892c
                                                                                • Instruction ID: 38980f856acfe19f3d8287f2c25042e4bdf5ad1f134c184e390c182dd14c67a5
                                                                                • Opcode Fuzzy Hash: 352c09d5f53d13216435241376a7765f4291fdcb6e8141ac56646f5277de892c
                                                                                • Instruction Fuzzy Hash: 11D15DB4C09218CFDB24CFA6C8857EDBBB5BB49345F909569E049B3290DB784AC5CF11
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: C$G
                                                                                • API String ID: 0-2496519966
                                                                                • Opcode ID: f9c24fc5f6db47a4965bb231d433be80bc268e147d1de9f1ce09573b01a3a14f
                                                                                • Instruction ID: 6c8ca5209ea1317fa555ef2e14b84e541603ccc6faa18abefd86a23d4119aab3
                                                                                • Opcode Fuzzy Hash: f9c24fc5f6db47a4965bb231d433be80bc268e147d1de9f1ce09573b01a3a14f
                                                                                • Instruction Fuzzy Hash: 35C16D70C09218CFDB24DFA6C8897EDBBB5BB49345F5095A9E049A3291DB384AC5CF11
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: C$G
                                                                                • API String ID: 0-2496519966
                                                                                • Opcode ID: 6ef9ca3729404f4791fbbd15a8d867b9ad86162eccfac9db5881cc3c105b51b8
                                                                                • Instruction ID: a168b04acf8abd87a40c6d7872aa0170bf3c57c724bd298f4070a120428e3297
                                                                                • Opcode Fuzzy Hash: 6ef9ca3729404f4791fbbd15a8d867b9ad86162eccfac9db5881cc3c105b51b8
                                                                                • Instruction Fuzzy Hash: 30B17C70D09218CFDB24DFA6C8897EDBBB6BB49345F5095A9E049B3290DB380AC5CF11
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 0993ABB7
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0993AC7F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ContextMemoryProcessReadThread
                                                                                • String ID:
                                                                                • API String ID: 1264303914-0
                                                                                • Opcode ID: 08c81d4837753f73ea8153414e57e26efd36449039618d3708658e17479d6984
                                                                                • Instruction ID: a6c0cd661d903eb23e6f4ae118ee9f5da4cf88d32280687cb3af11e77a3ae01f
                                                                                • Opcode Fuzzy Hash: 08c81d4837753f73ea8153414e57e26efd36449039618d3708658e17479d6984
                                                                                • Instruction Fuzzy Hash: BD3134B5D01249DFCB00CF9AC884BDEBBF4FF08320F44816AE958A3251D338A945DBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 0993AA4B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: 876ad6d144893c5162dbc391865b6859fb1259ad887fab1979be24d39b1a326d
                                                                                • Instruction ID: 15febc5dea88460a11f84ae59143361bae4e6476cd1393557e8e49437b7029b7
                                                                                • Opcode Fuzzy Hash: 876ad6d144893c5162dbc391865b6859fb1259ad887fab1979be24d39b1a326d
                                                                                • Instruction Fuzzy Hash: F2510371901329DFDF20CF99C980BDDBBB6AF88304F15859AE948B7250DB309A88DF51
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 0993AA4B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: 5b584d06e53abe6c466840bb22d03b72e8fd6f98f6b168b7b9786f6545d489e4
                                                                                • Instruction ID: fdebce7b1b725be83b0eb024fcec7c61c340f4f5791606d9b26014d72bbefbb3
                                                                                • Opcode Fuzzy Hash: 5b584d06e53abe6c466840bb22d03b72e8fd6f98f6b168b7b9786f6545d489e4
                                                                                • Instruction Fuzzy Hash: F3510571901328DFDF20CF95C980BDDBBB6AF88304F15819AE948B7210DB319A88DF51
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0166FE4A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: c38927b312a66d9b9d9edddec6b5de63c14d19d06f85f08534635cf62b2b67ed
                                                                                • Instruction ID: a5026f5c315d4049b2468a5b44c399d216a3aae64ead0c3c16c1d3a1c5a255e4
                                                                                • Opcode Fuzzy Hash: c38927b312a66d9b9d9edddec6b5de63c14d19d06f85f08534635cf62b2b67ed
                                                                                • Instruction Fuzzy Hash: 5D51B0B1D00348AFDB14CF99D894ADEBFB5BF48314F24816AE519AB310D774A845CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0166FE4A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: fb26329d28ab69c90221a7e552e0c471ca4fe06c74061b0a6aa2dee0fdf6cd6c
                                                                                • Instruction ID: 8462e1e4be923eb9f75793a00f2fa8debf4912e671f6fde4e9f9087be6bcbab3
                                                                                • Opcode Fuzzy Hash: fb26329d28ab69c90221a7e552e0c471ca4fe06c74061b0a6aa2dee0fdf6cd6c
                                                                                • Instruction Fuzzy Hash: F851CEB1D00208AFDF14CF99D984ADEBFB5BF88310F24812AE519AB310D774A885CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 01665421
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: fd63dd7179873efd00acf8152cbbbddb07a33b7de0c52341e7d45943d474a140
                                                                                • Instruction ID: 170238fd87c5ba88cddba864f7dacc73cf80a253da9bca443ecba205e4d4c1b5
                                                                                • Opcode Fuzzy Hash: fd63dd7179873efd00acf8152cbbbddb07a33b7de0c52341e7d45943d474a140
                                                                                • Instruction Fuzzy Hash: 83410FB1D0472CCADF24DFA9C9847CDBBB5BF48308F21816AD409AB250DB75694ACF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 01665421
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: 5fc22ab0c98c06b531f6f2d6e97e487341e02f895c9036a72124fd9ac7767b2d
                                                                                • Instruction ID: d9978817e1d0d168a5333ec851fd3c71f2bc7c5a51b5468d534335e1b5e6dd75
                                                                                • Opcode Fuzzy Hash: 5fc22ab0c98c06b531f6f2d6e97e487341e02f895c9036a72124fd9ac7767b2d
                                                                                • Instruction Fuzzy Hash: F841E071D0422CCBDF24DFA9C8847CEBBB5BF48308F61806AD509AB251DBB56945CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 0993ABB7
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ContextThread
                                                                                • String ID:
                                                                                • API String ID: 1591575202-0
                                                                                • Opcode ID: e8882d4776af8a9fb0b76fb988faf06832eba69239b28f1a2a5483a063f48f76
                                                                                • Instruction ID: 451243076cff1a7d501ac68b61b175254a28fec6b354f69852afd6f6d0697dab
                                                                                • Opcode Fuzzy Hash: e8882d4776af8a9fb0b76fb988faf06832eba69239b28f1a2a5483a063f48f76
                                                                                • Instruction Fuzzy Hash: D8315671E01259CFDB10CFAAC984BEEBBF5AB09214F54816AD499F3240D738A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0166B8BE,?,?,?,?,?), ref: 0166B97F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: c04dd042c44ad828d0360a469de191b769aa0605571578c89fda84517356dcbb
                                                                                • Instruction ID: fb5eaf0fcf6b6df548e0968755fc44515c0a6d15a49f0dd6576c75b148b69eed
                                                                                • Opcode Fuzzy Hash: c04dd042c44ad828d0360a469de191b769aa0605571578c89fda84517356dcbb
                                                                                • Instruction Fuzzy Hash: 642103B5904348EFDB10CF9AD884ADEBBF8EB48320F14841AE914B3310D774A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0993AE05
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: 3f8d3052dc11666478366f4b84ac1fe86d185f215f655726ac656a79308edb7c
                                                                                • Instruction ID: 09b709b2c41c88a007b5c855a6eb58634f0158e144275805bf2eeb1c4cecd2b8
                                                                                • Opcode Fuzzy Hash: 3f8d3052dc11666478366f4b84ac1fe86d185f215f655726ac656a79308edb7c
                                                                                • Instruction Fuzzy Hash: 492120B1901259DFCB10CF9AC884BDEBBF4FF48314F00842AE958A3350D778A944DBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0993AE05
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: 6490575070c74e31831e0371114f5761b5d4c2f121e98870bb01c46bc2cfeed7
                                                                                • Instruction ID: adc699b647e4edb737ba1cb071a351a08c9fa3d1b64faca5ce7529f588f56cf8
                                                                                • Opcode Fuzzy Hash: 6490575070c74e31831e0371114f5761b5d4c2f121e98870bb01c46bc2cfeed7
                                                                                • Instruction Fuzzy Hash: 032100B1901259DFCB10CF9AC884BDEBBF4FB48314F40842AE959A3250D778A944DBA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0166B8BE,?,?,?,?,?), ref: 0166B97F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 7b5ffd4597e3b35ac3f347c06752a64387136b6a0f1e6e03e44857f94a6f42af
                                                                                • Instruction ID: 512b961ae48461a5aae7122588dc3e2e333586f05e5839dea7494f281f222ce1
                                                                                • Opcode Fuzzy Hash: 7b5ffd4597e3b35ac3f347c06752a64387136b6a0f1e6e03e44857f94a6f42af
                                                                                • Instruction Fuzzy Hash: C521E4B5D00258EFDB10CF99D884ADEBBF8EB48320F14841AE954B7310D378A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0993AC7F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: 449fee7e4f58ea495ce46174587bd8c71db03333398a77a9558b7bb7093d7059
                                                                                • Instruction ID: 1611111d11597b01c485bc5d71614911252a35ad58a58152f243adeb3d3f1efc
                                                                                • Opcode Fuzzy Hash: 449fee7e4f58ea495ce46174587bd8c71db03333398a77a9558b7bb7093d7059
                                                                                • Instruction Fuzzy Hash: 262102B1901349DFCB10CF9AC884BDEBBF8FB48320F10842AE958A3210D374A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 0993ABB7
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ContextThread
                                                                                • String ID:
                                                                                • API String ID: 1591575202-0
                                                                                • Opcode ID: 7629c0661baded52d89738b5255ab10102ed3f828dffa6ab8c62972d3273d284
                                                                                • Instruction ID: 33e2d57290fb5771917468aa36a71e7073b367717495a3cd49e3f0bb753a1018
                                                                                • Opcode Fuzzy Hash: 7629c0661baded52d89738b5255ab10102ed3f828dffa6ab8c62972d3273d284
                                                                                • Instruction Fuzzy Hash: FF210871D016599FCB00CF9AC445BDEFBF8BB48214F54812AE458B3740D778A9448FA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01669991,00000800,00000000,00000000), ref: 01669BA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 4c8db2b4cfd4aaa0e854970829cc33681c4dffa8db7b7e70be58c64752a06720
                                                                                • Instruction ID: 0b15cdeb15816fb5780aaf03c03da4449f510c4fae337eaaf04d8c3019340848
                                                                                • Opcode Fuzzy Hash: 4c8db2b4cfd4aaa0e854970829cc33681c4dffa8db7b7e70be58c64752a06720
                                                                                • Instruction Fuzzy Hash: 201103B29002499FDB10CF9AC844ADEFBF8EB88324F04842EE915B7300C775A945CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01669991,00000800,00000000,00000000), ref: 01669BA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: e44488e03cb0ce41fdc389e0764fab9292ddc9a2111b248dd538db9a2dc6d339
                                                                                • Instruction ID: 27ecbeb51e022c86f2b6805e7b564a135728067b990f62d5bcbb2c88f6cab024
                                                                                • Opcode Fuzzy Hash: e44488e03cb0ce41fdc389e0764fab9292ddc9a2111b248dd538db9a2dc6d339
                                                                                • Instruction Fuzzy Hash: 1F1114B29002499FDB14CF9AC844ADEFBF8EB88324F05841ED915B7700C775A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 01669916
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 9f4cbfd5b1d830bd3b5443a2b361f75fa92da29f6142d0f5b9992a8d83b5b1a0
                                                                                • Instruction ID: 74277caadb7226e33c62bf7184f6c3b811d61675353e72dd2af8d08ae6a5e8d8
                                                                                • Opcode Fuzzy Hash: 9f4cbfd5b1d830bd3b5443a2b361f75fa92da29f6142d0f5b9992a8d83b5b1a0
                                                                                • Instruction Fuzzy Hash: 9F1123B6C00249CEDB10CF9AC8447DEBBF8AF88328F05851AD869B7710D374A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0993AD3B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: 9e101e261cdf91944c84ed9ecb1dfd3a9cb0ca599748937d84255af1cc9302ed
                                                                                • Instruction ID: e6a699889e1b6d231082bc6cc9ed3c0971af642078d9e91b44c7b179352e748f
                                                                                • Opcode Fuzzy Hash: 9e101e261cdf91944c84ed9ecb1dfd3a9cb0ca599748937d84255af1cc9302ed
                                                                                • Instruction Fuzzy Hash: 6211F2B5900289DFCB10DF9AC884BDEBFF8FB48324F148419E669A7250C775A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 01669916
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 8dd17ff6c0dcb27ca82f447def9d13f9954e4e9011a998e4b2b3ba2a2f66adf9
                                                                                • Instruction ID: a95778655d6b8af8585eae3810dd5389955b1dced37bbd09d0e4f17d0fb1237a
                                                                                • Opcode Fuzzy Hash: 8dd17ff6c0dcb27ca82f447def9d13f9954e4e9011a998e4b2b3ba2a2f66adf9
                                                                                • Instruction Fuzzy Hash: 5E110FB2D002498FDB10CF9AC844ADEFBF8EB88324F15851AD929B7710C374A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0993AD3B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: 27be5388e56d711ed0f53c1c59d013d08c056219854ca940c564a3f1235e83e5
                                                                                • Instruction ID: 19fc2560cde60ff31389aec25ac7627c660a9ddc3e5ba63513e2d7a078c11464
                                                                                • Opcode Fuzzy Hash: 27be5388e56d711ed0f53c1c59d013d08c056219854ca940c564a3f1235e83e5
                                                                                • Instruction Fuzzy Hash: 0C1110B6900249DFCB10CF99C884BDEBBF4EB48324F14841AE669A7220D335A544DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • PostMessageW.USER32(?,?,?,?), ref: 0993B7D5
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: 2ac3b75b0f049de0f3d7cd60bcea50abee8d0822bb63bb30166cde08ded39532
                                                                                • Instruction ID: 031aba0304b33e94d4265616be8619ed4c988fcbdf3c201dd7961032d4047569
                                                                                • Opcode Fuzzy Hash: 2ac3b75b0f049de0f3d7cd60bcea50abee8d0822bb63bb30166cde08ded39532
                                                                                • Instruction Fuzzy Hash: C911E2B58003499FDB10CF99C888BDEBBF8EB48324F14841AE555A7710C375A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: 36e291e5aa79c588fea6a3b2d781770b2a26362498254458850f40f41d8191a6
                                                                                • Instruction ID: d0809926daafafa9999d3100c986253a8a6239d33ae7eb7dbef1e31c582d2163
                                                                                • Opcode Fuzzy Hash: 36e291e5aa79c588fea6a3b2d781770b2a26362498254458850f40f41d8191a6
                                                                                • Instruction Fuzzy Hash: 3D110DB5C00249CFCB20CF99C588BDEBBF4AB48324F24851AD569B7790D778A944CFA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: 0b6028d02762375afabae702d5bc98397cf5f46b422008fd706aa61272acec15
                                                                                • Instruction ID: a379a4115513eb0c67ef0e89fe85ae18098474e0a093f61e949d1c126e09bda0
                                                                                • Opcode Fuzzy Hash: 0b6028d02762375afabae702d5bc98397cf5f46b422008fd706aa61272acec15
                                                                                • Instruction Fuzzy Hash: FC01E2B08043898FCB10DF9AC488B9EBFF8AB48314F148419D559B7350D778A544CFA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Non-executed Functions

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: #F-!$z$5${<Q
                                                                                • API String ID: 0-2947102094
                                                                                • Opcode ID: a4176428116321d24082bc49e69a676ef84063614a559f2a1b606000b9d11bf0
                                                                                • Instruction ID: d3b50b25f27b7863a36611e49806403e3286266bf3eeb5e73ad9fade2a34ef0f
                                                                                • Opcode Fuzzy Hash: a4176428116321d24082bc49e69a676ef84063614a559f2a1b606000b9d11bf0
                                                                                • Instruction Fuzzy Hash: 7303A17A600514EFDB469F98C944E557BB2FF4C318B0680D8E60A9F276C736E8A1EF50
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: e/
                                                                                • API String ID: 0-2271780862
                                                                                • Opcode ID: 6ccba5b82fca62dfc91ada609fdb385ef03e96509ff4cc6deb2206f55292c67f
                                                                                • Instruction ID: 91f3d20bc8ac11cec449a7e23e93186402317d8bc0ee440c1d6b5611b4da2bda
                                                                                • Opcode Fuzzy Hash: 6ccba5b82fca62dfc91ada609fdb385ef03e96509ff4cc6deb2206f55292c67f
                                                                                • Instruction Fuzzy Hash: CF51D774E5810AAFCB54CE7BC8415ADB7F2EB88381BE8D9A5A41ADB704E778D5018F40
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4ec1f7daff6911c97d6f0e743008ca081e22d7a5fa926d3dcaa3449cb0e28172
                                                                                • Instruction ID: 6053e930b57362c86186be5e4ba277b63e0dcd699958ac57e9d79d9f8414f6c0
                                                                                • Opcode Fuzzy Hash: 4ec1f7daff6911c97d6f0e743008ca081e22d7a5fa926d3dcaa3449cb0e28172
                                                                                • Instruction Fuzzy Hash: 5E12CAF18117468BE330EF65E9881993FA1F745338F92C728D2652BAE9D7B4124ACF44
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5624743e3fb65220c70ee4aa65b4d2b8cf6076392c790d843f8142d894c988e1
                                                                                • Instruction ID: 0d037de8ac6c4cb05feceb3c705e40cac11c5ea33ebebfe0d9be6d0244f35f48
                                                                                • Opcode Fuzzy Hash: 5624743e3fb65220c70ee4aa65b4d2b8cf6076392c790d843f8142d894c988e1
                                                                                • Instruction Fuzzy Hash: B7A17C32E0061A8FCF15DFE9C8445DEBBBAFF84300B15856AE945BB261DB35A905CB40
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.254120471.0000000001660000.00000040.00000001.sdmp, Offset: 01660000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e836a1b8d300d232b8f9d096b2d12eb5f1d631a260889643fa567d7be98d7ac5
                                                                                • Instruction ID: 858723352a7a7cc766d3d8d8927fb61b46e07f1be187c0692abaca9113376daa
                                                                                • Opcode Fuzzy Hash: e836a1b8d300d232b8f9d096b2d12eb5f1d631a260889643fa567d7be98d7ac5
                                                                                • Instruction Fuzzy Hash: 94C12FB18117458BE730EF65E9881997FB1FB85338F52C728D1612BAD8D7B4124ACF84
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.261301788.0000000009930000.00000040.00000001.sdmp, Offset: 09930000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 96841e0e489fd15f5b1773b16c6ba343a8e8b74168390efb816e9eab7cf19dc5
                                                                                • Instruction ID: b5d0c8e878811e6c84d0e8c32fe1e5bc2756ee1fae0af44be95757f66e54280b
                                                                                • Opcode Fuzzy Hash: 96841e0e489fd15f5b1773b16c6ba343a8e8b74168390efb816e9eab7cf19dc5
                                                                                • Instruction Fuzzy Hash: 6E3198B4E1810AFFD744CE6EC84219E77B5FB88340B94C976946ADB784E774D9018F10
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Executed Functions

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: d8204694a11258fcc23e21276c0e3ac8679e3e1f6554c3bc81df88dbc3c93a14
                                                                                • Instruction ID: 3ee80dd21da67c2b5645b5b0935a2f4cf46b441fac954f7166313a97c134eb59
                                                                                • Opcode Fuzzy Hash: d8204694a11258fcc23e21276c0e3ac8679e3e1f6554c3bc81df88dbc3c93a14
                                                                                • Instruction Fuzzy Hash: 7A923574A40228CFCB65EF21D95869DB7BABF88305F1084E9D50AA7744CB349EC9CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0636B62B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID: >&$>&
                                                                                • API String ID: 2645101109-3363130021
                                                                                • Opcode ID: 4536d20a85d518ac4ed28fa3129ce2d925cc375bfa970654d6d218469a316065
                                                                                • Instruction ID: b2900119e01067bf298df69bf62c9ee4a23001ebd9fa078f874cec040cf90fd5
                                                                                • Opcode Fuzzy Hash: 4536d20a85d518ac4ed28fa3129ce2d925cc375bfa970654d6d218469a316065
                                                                                • Instruction Fuzzy Hash: 7F510170D102188FDB54CFAAC895BDDFBB5BF48314F15812AE816AB354DBB49848CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 05596BB0
                                                                                • GetCurrentThread.KERNEL32 ref: 05596BED
                                                                                • GetCurrentProcess.KERNEL32 ref: 05596C2A
                                                                                • GetCurrentThreadId.KERNEL32 ref: 05596C83
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID: >&
                                                                                • API String ID: 2063062207-2926484043
                                                                                • Opcode ID: a93e8f934237ad2babfb5953ada7b6ef00a6cf380654d6696858bad84f9d91e7
                                                                                • Instruction ID: 6150d23ad65c3faa5f73bd1db59aad533571812b956f5dadc2b86d1320f739f8
                                                                                • Opcode Fuzzy Hash: a93e8f934237ad2babfb5953ada7b6ef00a6cf380654d6696858bad84f9d91e7
                                                                                • Instruction Fuzzy Hash: 275134B09006888FDB18CFA9D648B9EBBF1FF48314F24845AE009B7350DB746848CFA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: 5d4fd145714df7ac19169e75edc4490006e469a5473cd64a0fcdf4529d0cf3c5
                                                                                • Instruction ID: 95ffdfcda04ac1ba1ec12bac5fb1d63355b53b94f027f22070c2b52865150af4
                                                                                • Opcode Fuzzy Hash: 5d4fd145714df7ac19169e75edc4490006e469a5473cd64a0fcdf4529d0cf3c5
                                                                                • Instruction Fuzzy Hash: 17523974A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: a567961e2d9f9e19c80763e368f60394e61954541cb6201b4e34430fa23175f9
                                                                                • Instruction ID: 66642b5667143e68129a651ec8b892af6d1c5ff76197aac45c23a4454dfdca2a
                                                                                • Opcode Fuzzy Hash: a567961e2d9f9e19c80763e368f60394e61954541cb6201b4e34430fa23175f9
                                                                                • Instruction Fuzzy Hash: 13523874A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: cf62a7b195b899fdf74b18663a7bcbfe4abf3284e1d5540b9ff2dc901713723b
                                                                                • Instruction ID: 93533311920f7d211f682e4306c90431cb35089adfabd669ded90bec0d68537d
                                                                                • Opcode Fuzzy Hash: cf62a7b195b899fdf74b18663a7bcbfe4abf3284e1d5540b9ff2dc901713723b
                                                                                • Instruction Fuzzy Hash: F5524774A01228CFCB65DF21D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: 0e979fa9eb63e5e099a4067e6caf21e08f06595827af202cb2c97f8f1110103b
                                                                                • Instruction ID: fd692c065e46dc4c8a22b244a24a9bc395f4f307a52539f24d266738a0adae6d
                                                                                • Opcode Fuzzy Hash: 0e979fa9eb63e5e099a4067e6caf21e08f06595827af202cb2c97f8f1110103b
                                                                                • Instruction Fuzzy Hash: 84523874A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: f0d000a9df68603a3ae7ab385099d1d751429faecb2cc651fbedb4290d6aaa82
                                                                                • Instruction ID: f24ad10ced01c9c2e31a868104ddb493e8532668237346c214255ba88ad976cb
                                                                                • Opcode Fuzzy Hash: f0d000a9df68603a3ae7ab385099d1d751429faecb2cc651fbedb4290d6aaa82
                                                                                • Instruction Fuzzy Hash: 98423774A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: 6d8d03edc790ca8fffc02cc507387d6d28e572db9957a24a7a4fd3894a15d786
                                                                                • Instruction ID: 0d6bf14d6ba58f903cb445b2cf4fe358913a4a2047cde8b1cd117b9dd67f0dcd
                                                                                • Opcode Fuzzy Hash: 6d8d03edc790ca8fffc02cc507387d6d28e572db9957a24a7a4fd3894a15d786
                                                                                • Instruction Fuzzy Hash: AB423874A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: b0569c26fe6dde30f4ed95414a24455ba052d37ace9e1f4757ad66e6d3ec2213
                                                                                • Instruction ID: 4c9f1a11598d9cabba8e3d91e0ee03a1bfc6e3845c116922322f144aeaef4b90
                                                                                • Opcode Fuzzy Hash: b0569c26fe6dde30f4ed95414a24455ba052d37ace9e1f4757ad66e6d3ec2213
                                                                                • Instruction Fuzzy Hash: 3D424774A01228CFCB65DF21D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: 271edfe1ec1dc84f5e6e5940de9ea0d978784fd0b899d9798376efd0db31566c
                                                                                • Instruction ID: c8c02f362a2f26dcdf46797ab82d775bb9ff0a3e422ff10d097958565438932f
                                                                                • Opcode Fuzzy Hash: 271edfe1ec1dc84f5e6e5940de9ea0d978784fd0b899d9798376efd0db31566c
                                                                                • Instruction Fuzzy Hash: E6424974A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: 4667a1fa4373dd2e7a4a38c797916dd7f565c93b6daac58b14c4f2fa5b1a5861
                                                                                • Instruction ID: 7a76d0444659484a3a884f0d82612bb45d9d18c095c02f0100f8c4701323ae33
                                                                                • Opcode Fuzzy Hash: 4667a1fa4373dd2e7a4a38c797916dd7f565c93b6daac58b14c4f2fa5b1a5861
                                                                                • Instruction Fuzzy Hash: 68425874A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL ref: 0636D1F2
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                                                • String ID:
                                                                                • API String ID: 243558500-0
                                                                                • Opcode ID: fdac5289da207b3a2360fe7b162e2bc818c6b13d0b6df6d4a058e627b6349a19
                                                                                • Instruction ID: 559183934e2143b22ee5e0ec5072e17721fb55b2f5b1d7edfc7bf41e4b3fc373
                                                                                • Opcode Fuzzy Hash: fdac5289da207b3a2360fe7b162e2bc818c6b13d0b6df6d4a058e627b6349a19
                                                                                • Instruction Fuzzy Hash: D4425874A01228CFCB65DF31D95869DB7BABF88306F1084E9D60AA7744CB349E85CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0636B62B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID: >&$>&
                                                                                • API String ID: 2645101109-3363130021
                                                                                • Opcode ID: 96970bfab248c87c0f0ebff7eb972bdaa098e0ef47a4fcd6d8b996c1464592d1
                                                                                • Instruction ID: 84443210cf24400f3778968312465015e6070e723b57a2a1b6ab55fdf13f6356
                                                                                • Opcode Fuzzy Hash: 96970bfab248c87c0f0ebff7eb972bdaa098e0ef47a4fcd6d8b996c1464592d1
                                                                                • Instruction Fuzzy Hash: 28512270D102188FDB14CFAAC895BDDFBB1BF48314F14812AE816AB355D7749848CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0636B62B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID: >&$>&
                                                                                • API String ID: 2645101109-3363130021
                                                                                • Opcode ID: 64ad3fd7477be2c9d53767d3296422c688cd5dfd2d030112dd213ce4050f56c1
                                                                                • Instruction ID: 6a2200e0ae49b967024260e4091238c9bca122602b8556445017af3e81a2f651
                                                                                • Opcode Fuzzy Hash: 64ad3fd7477be2c9d53767d3296422c688cd5dfd2d030112dd213ce4050f56c1
                                                                                • Instruction Fuzzy Hash: D951F270D102188FDB54CFAAC895BDDFBB5BF48314F15812AE816AB354DBB49848CF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055952A2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID: >&$>&
                                                                                • API String ID: 716092398-3363130021
                                                                                • Opcode ID: c8bb34dcaea2138dcc45886c6f22d4cab7de9296ab91863114a79cc37d9a77e0
                                                                                • Instruction ID: d55e13049256808fdec6823f583b25eb4ad3bbe043ac3f41c840f8f3e36e8a20
                                                                                • Opcode Fuzzy Hash: c8bb34dcaea2138dcc45886c6f22d4cab7de9296ab91863114a79cc37d9a77e0
                                                                                • Instruction Fuzzy Hash: 2B51C0B1D103499FDF15CFA9C984ADEFBB5BF48314F24822AE819AB210D7749885CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055952A2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID: >&$>&
                                                                                • API String ID: 716092398-3363130021
                                                                                • Opcode ID: f80a5c9e5351b4ff34a0527363aafe3a8051b856da52a0fd92beed08a2de6b30
                                                                                • Instruction ID: 23449249c460e18bfad382f3823bc439b8db07639626e95043fc5fe6dc529d84
                                                                                • Opcode Fuzzy Hash: f80a5c9e5351b4ff34a0527363aafe3a8051b856da52a0fd92beed08a2de6b30
                                                                                • Instruction Fuzzy Hash: 3741C0B1D103499FDF15CF99C984ADEFBB5BF88314F24822AE819AB210D7749885CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: e3dbbc5d2db0f020c2e9e25f349ddffc82dec83374533016b8b214d288ec3e0e
                                                                                • Instruction ID: bf927586e554375b2a915941841003dc5eeef5fae82bb46b97a760502b7f20e8
                                                                                • Opcode Fuzzy Hash: e3dbbc5d2db0f020c2e9e25f349ddffc82dec83374533016b8b214d288ec3e0e
                                                                                • Instruction Fuzzy Hash: E1024174A01228CFCB65DF20D99469DB7BABF48306F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 1d0a2291bc591ae30e8f73b713d51c2ba5a13240e8ad01d80ec80682e418f891
                                                                                • Instruction ID: c615e822b3ccf0274a5ec36f188629eb89c4ed4f444b48601a088910acb92c55
                                                                                • Opcode Fuzzy Hash: 1d0a2291bc591ae30e8f73b713d51c2ba5a13240e8ad01d80ec80682e418f891
                                                                                • Instruction Fuzzy Hash: 1E024074A01228CFCB65DF20D99469DB7BABF48306F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 96361a414349a5f6a957cdb2b8f83c9e921f23e576d10b3787208ae8770d8c58
                                                                                • Instruction ID: bf4a563739d633da59f7aeb69d4ebf3381ffffdd57e755918698a17b8f0084b2
                                                                                • Opcode Fuzzy Hash: 96361a414349a5f6a957cdb2b8f83c9e921f23e576d10b3787208ae8770d8c58
                                                                                • Instruction Fuzzy Hash: DAF15174A01228CFCB65DF21D99469CB7BABF48306F1084E9D60AA7744CB349EC6CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: a2ae33fe49938b2c37b2248318e613ce26688998ff08acd3febec21dedb5c1ce
                                                                                • Instruction ID: b987a5debcc68e20a4f7bdb7c3e7d1da61037fcb2bbe63c65ef223f685bb2050
                                                                                • Opcode Fuzzy Hash: a2ae33fe49938b2c37b2248318e613ce26688998ff08acd3febec21dedb5c1ce
                                                                                • Instruction Fuzzy Hash: EBF15074A01228CFCB65DF20D99469CB7BABF48306F1084E9D60AA7744CB349EC6CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: d5ca83199f2b0de04043cf8ed2f84e97241e75c2d6ae54a6cdc4519697b27742
                                                                                • Instruction ID: 50017d18ee9673889021c0c6925340c2ac0fe66b29881ea08c1e8ab26f40cb44
                                                                                • Opcode Fuzzy Hash: d5ca83199f2b0de04043cf8ed2f84e97241e75c2d6ae54a6cdc4519697b27742
                                                                                • Instruction Fuzzy Hash: DBF15074A01228CFCB65DF20D99469CB7BABF48306F1081E9D60AA7744CB349EC6CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 42690feaa6f2f8f6e49cd0c195b091fef62371e30c97ab2b44451a25a9c16537
                                                                                • Instruction ID: bca058794741514d9c4ccff87ec447ed814e552978312a1fe44459d8847b83fe
                                                                                • Opcode Fuzzy Hash: 42690feaa6f2f8f6e49cd0c195b091fef62371e30c97ab2b44451a25a9c16537
                                                                                • Instruction Fuzzy Hash: 5AF15074A01228CFCB65DF21D99469CB7BABF48306F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: dc675da1b240ee5e85e0c9e782893ce50f91e6bac73f4e6ecbd36a0be7465315
                                                                                • Instruction ID: 6480304b717ec6199e28dab23ed5898127971d052d4bb6f64664a474652343a6
                                                                                • Opcode Fuzzy Hash: dc675da1b240ee5e85e0c9e782893ce50f91e6bac73f4e6ecbd36a0be7465315
                                                                                • Instruction Fuzzy Hash: F0F15F74A01228CFCB65DF21D99469DB7BABF48306F1080E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 20544eb9e41614729aff838c73b6cce21ad134bbf24f357f2798f610ef604741
                                                                                • Instruction ID: bca3c9cb149720b716883ea9fd6d8688452a65c17d8d346f4e7213090f448e30
                                                                                • Opcode Fuzzy Hash: 20544eb9e41614729aff838c73b6cce21ad134bbf24f357f2798f610ef604741
                                                                                • Instruction Fuzzy Hash: 6EE15074A01228CFCB65DF21D99469DB7BABF48306F1080E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: eb9dadec360a261379d873b5bc357f5b0de0c6a3ff5ffd7cf2f02a156bffa89b
                                                                                • Instruction ID: 2f0c5235d39bfa14474356700ead294c43151709fab16e4025f74a5b8dfeb684
                                                                                • Opcode Fuzzy Hash: eb9dadec360a261379d873b5bc357f5b0de0c6a3ff5ffd7cf2f02a156bffa89b
                                                                                • Instruction Fuzzy Hash: 40E15074A01228CFCB64DF21D99469CB7BABF48306F1080E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D7B4
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 6f9393301f27505c7ccc2e254f407222971ea6b1b73cda110f77cb062e30ab75
                                                                                • Instruction ID: db9159079ef22625b964dfc736e6bda1ef32076d5ace136957ef995315dd1334
                                                                                • Opcode Fuzzy Hash: 6f9393301f27505c7ccc2e254f407222971ea6b1b73cda110f77cb062e30ab75
                                                                                • Instruction Fuzzy Hash: 3EE15F74A01228CFCB64DF21D99469DB7BABF48306F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 06757D91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: QueryValue
                                                                                • String ID: >&
                                                                                • API String ID: 3660427363-2926484043
                                                                                • Opcode ID: 85571cd8f1599cba6b2a5d21c868945d6e57ac79087a8619be8ab2e5e180f08f
                                                                                • Instruction ID: 8a5d636ae3cfc7c5b936b255bec7b270e68cfd09bc02f552162d0dd81c61e29e
                                                                                • Opcode Fuzzy Hash: 85571cd8f1599cba6b2a5d21c868945d6e57ac79087a8619be8ab2e5e180f08f
                                                                                • Instruction Fuzzy Hash: CF4139B0E003599FCB54CFA9C984AAEBBF6BF48704F258069E819AB354D7749805CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DeleteFileW.KERNEL32(00000000), ref: 0636BA10
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DeleteFile
                                                                                • String ID: >&
                                                                                • API String ID: 4033686569-2926484043
                                                                                • Opcode ID: cca65b0bd7740ad1111d1044ea06be95d587c731d24902c9d1a97a25093280a8
                                                                                • Instruction ID: 8534e7df460675a6b40ddded9fd6b9f7a5105033296a912afc58837394c868b9
                                                                                • Opcode Fuzzy Hash: cca65b0bd7740ad1111d1044ea06be95d587c731d24902c9d1a97a25093280a8
                                                                                • Instruction Fuzzy Hash: 4331AD70D0528A8FCB10CF6AC4007AEFBF4AF45214F15816AE485A7246D7389849CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05597D01
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CallProcWindow
                                                                                • String ID: >&
                                                                                • API String ID: 2714655100-2926484043
                                                                                • Opcode ID: d889fcd3688abc8ffdc685872a4e37eaaea4819431170bde6ab6203c074519cd
                                                                                • Instruction ID: d09a81c82f073a61a8a13d45ac909c235800496884513dbc41e3884e8e0dc79a
                                                                                • Opcode Fuzzy Hash: d889fcd3688abc8ffdc685872a4e37eaaea4819431170bde6ab6203c074519cd
                                                                                • Instruction Fuzzy Hash: 40413AB4A10345CFCB14CF99C488AAABBF5FF8D314F15845AE419AB321D734A841CFA0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 06757D91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: QueryValue
                                                                                • String ID: >&
                                                                                • API String ID: 3660427363-2926484043
                                                                                • Opcode ID: 96b39a49fe11966f353792464740d5eb0fb28d8be6a62b750fc4a30d48f12b68
                                                                                • Instruction ID: 8e45dc5d89cd3c6d46ee6e4509c015831a8f655b6c7703fd43d610996f82019e
                                                                                • Opcode Fuzzy Hash: 96b39a49fe11966f353792464740d5eb0fb28d8be6a62b750fc4a30d48f12b68
                                                                                • Instruction Fuzzy Hash: A031D1B1D003589FCB14CF9AC984A9EBFF5BF48710F25816AE819AB314D7749945CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RegOpenKeyExW.KERNEL32(?,00000000,?,00000001,?), ref: 06757AD4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Open
                                                                                • String ID: >&
                                                                                • API String ID: 71445658-2926484043
                                                                                • Opcode ID: 5c87be7e0fb722d48a837f1347b6db836e7363a29c069616c0d893eac645d8b8
                                                                                • Instruction ID: 20fac84af86eac30e5c3cc174fc47ba740dd51e31aa0149d7f289c640686c3be
                                                                                • Opcode Fuzzy Hash: 5c87be7e0fb722d48a837f1347b6db836e7363a29c069616c0d893eac645d8b8
                                                                                • Instruction Fuzzy Hash: F931F3B0D012898FDB14CF99C584A8EFFF5BF48304F15C16AE809AB304C7B59985CB90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0559C442
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: EncodePointer
                                                                                • String ID: >&
                                                                                • API String ID: 2118026453-2926484043
                                                                                • Opcode ID: 83fdd8f95df112da27a86ff9d51413b097301f78342b45a398d70057ed684f22
                                                                                • Instruction ID: e89e16effac185d9706ef694e33278c1cb900095dae86f357320787d6fc41a60
                                                                                • Opcode Fuzzy Hash: 83fdd8f95df112da27a86ff9d51413b097301f78342b45a398d70057ed684f22
                                                                                • Instruction Fuzzy Hash: 5A31F1B19053808FDB14DFA8D9093AE7FF4FB05314F14805AE489A7341CB79A809CFA2
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05596DFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID: >&
                                                                                • API String ID: 3793708945-2926484043
                                                                                • Opcode ID: 9c13fc80833f687f5972c6680340d52cb528655e6b6212638b9f92b05d77db77
                                                                                • Instruction ID: aee0bbb47c962aeaf0f1bae86eb67357ba4cf27320284179ceb23772ae964334
                                                                                • Opcode Fuzzy Hash: 9c13fc80833f687f5972c6680340d52cb528655e6b6212638b9f92b05d77db77
                                                                                • Instruction Fuzzy Hash: AF21E2B59002489FDB10CFA9D984ADEBBF8FB48324F14801AE914A7310D778A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05596DFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID: >&
                                                                                • API String ID: 3793708945-2926484043
                                                                                • Opcode ID: 272183b1e762edebae026f5a4caa84ddd0daad3a6736862694ca26b19be0e0c8
                                                                                • Instruction ID: f915aa3b784702f4a9802366ff025f31d49ea28aabc210e9ed81ff86f7aa1259
                                                                                • Opcode Fuzzy Hash: 272183b1e762edebae026f5a4caa84ddd0daad3a6736862694ca26b19be0e0c8
                                                                                • Instruction Fuzzy Hash: DB21DFB59002489FDB10CFA9D984ADEBBF4FF48324F15841AE918B7310D378AA44DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DeleteFileW.KERNEL32(00000000), ref: 0636BA10
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DeleteFile
                                                                                • String ID: >&
                                                                                • API String ID: 4033686569-2926484043
                                                                                • Opcode ID: 4d728d9a2279ef1c4b8d93e66890ac014cd1803d757fc4cdea92e717f5752fd3
                                                                                • Instruction ID: 922af0244122ef1acdd2c29411d5d0125961fcf0d8ffd6c95293fc6d973e0aa5
                                                                                • Opcode Fuzzy Hash: 4d728d9a2279ef1c4b8d93e66890ac014cd1803d757fc4cdea92e717f5752fd3
                                                                                • Instruction Fuzzy Hash: B72133B1C006598BCB10CF9AC4447AEFBB4EF48224F05822AE859B7244D778A954CFE1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0559C442
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: EncodePointer
                                                                                • String ID: >&
                                                                                • API String ID: 2118026453-2926484043
                                                                                • Opcode ID: eeecb130bc17b9dcfd68c37b772d72a101a6f22bf824fd1f88a683daf96a669e
                                                                                • Instruction ID: cbbc91f662efafc1af03d61ffc6a0341f1306a2ab7c125001c6210492f2f2853
                                                                                • Opcode Fuzzy Hash: eeecb130bc17b9dcfd68c37b772d72a101a6f22bf824fd1f88a683daf96a669e
                                                                                • Instruction Fuzzy Hash: D7117FB19013458FDF20DFA9C54879EBFF4FB48314F14842AE449A7640DB79A945CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05594216
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID: >&
                                                                                • API String ID: 4139908857-2926484043
                                                                                • Opcode ID: 1391f043574080b889ee8693bf9833d0a8eab7324b9056ba2168d2ac5c6d1c92
                                                                                • Instruction ID: aa216ca72dcf2d8885a8c02ea58a09e8673292d98a585a05d44037d678986af7
                                                                                • Opcode Fuzzy Hash: 1391f043574080b889ee8693bf9833d0a8eab7324b9056ba2168d2ac5c6d1c92
                                                                                • Instruction Fuzzy Hash: 9B11E2B19006498FCF14CF9AD444A9EFBF4FB88214F15855AD419B7600C778A946CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05594216
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID: >&
                                                                                • API String ID: 4139908857-2926484043
                                                                                • Opcode ID: 7bd50d514bdbd0b7aedd031499a66fab7e27ada257a1bca94858daa7f2752531
                                                                                • Instruction ID: c5e52089efb6544bfba72e1a6226e4aeb454c1ebec2d8a6f9453dc3a88479732
                                                                                • Opcode Fuzzy Hash: 7bd50d514bdbd0b7aedd031499a66fab7e27ada257a1bca94858daa7f2752531
                                                                                • Instruction Fuzzy Hash: 1211F0B1C002498BCF14CF9AC884ADEFBF4FB88224F15851AD429B7600C779A546CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: b94ba803b82d838f58c6453903786771ea8e49fa15301e8872914d4c5952cfc1
                                                                                • Instruction ID: b7a677f3f0500864d6b7f04d44a7fe1788e729f0a426b01dfca44c3fcc2e1e4b
                                                                                • Opcode Fuzzy Hash: b94ba803b82d838f58c6453903786771ea8e49fa15301e8872914d4c5952cfc1
                                                                                • Instruction Fuzzy Hash: 78D14074A01228CFCB64DF21D99469DB7BABF48306F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: cf1916178b94ccf63c435f0d5a36b7d30823bf6446e3828f1b1f9a7c69a8dc05
                                                                                • Instruction ID: 40b8c25e8124bbfca49df386effc8a0ced21b15312c7069db97c9d84ab81385e
                                                                                • Opcode Fuzzy Hash: cf1916178b94ccf63c435f0d5a36b7d30823bf6446e3828f1b1f9a7c69a8dc05
                                                                                • Instruction Fuzzy Hash: 53D15074A01228CFCB64DF21D99469DB7BABF48306F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 979d1f108d94376596d46cd0b338729df2d8e4407cde7cdfe3a729c78e372e60
                                                                                • Instruction ID: 64fe1f7920df49b639d74113f7bb209cb8ff224d47f88444040c1a2f4682f74d
                                                                                • Opcode Fuzzy Hash: 979d1f108d94376596d46cd0b338729df2d8e4407cde7cdfe3a729c78e372e60
                                                                                • Instruction Fuzzy Hash: EDD15074A01228CFCB64DF21D99469DB7BABF48305F1084E9D60AA7744CB349ECACF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 9baf2d2859ee991a3c7deb7e6f7cec9f5c2d198ce468d9630addb2867f433c13
                                                                                • Instruction ID: c22264112020ef7ea2d6b96bd5b351b0b5aa229da8d04bfcbc86ed29f98dc3f1
                                                                                • Opcode Fuzzy Hash: 9baf2d2859ee991a3c7deb7e6f7cec9f5c2d198ce468d9630addb2867f433c13
                                                                                • Instruction Fuzzy Hash: E4D14F74A01228CFCB64DF21D99469DB7BABF48305F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 1a12a1dbe1ace4bf19b04f78292bd14ae3f9c87608f3e2507f662f70f0895491
                                                                                • Instruction ID: 37d28259acfd81d4add1e222d09946b491818f3463cfc2a3a281259b4b47ff19
                                                                                • Opcode Fuzzy Hash: 1a12a1dbe1ace4bf19b04f78292bd14ae3f9c87608f3e2507f662f70f0895491
                                                                                • Instruction Fuzzy Hash: FBC16F74A01228CFCB64DF21D99469DB7BABF88305F1084E9D60A97744CB349ECACF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 10eafc0d7d08ee37249c5eb780b439e3d95be9795a97c2ed862a6e7c9a6640d8
                                                                                • Instruction ID: 131ab7a6956068ecb5ef74c9faff282490bcbd07560e7bed89299057b39b6c34
                                                                                • Opcode Fuzzy Hash: 10eafc0d7d08ee37249c5eb780b439e3d95be9795a97c2ed862a6e7c9a6640d8
                                                                                • Instruction Fuzzy Hash: 89C15174A01228CFCB64DF21D99469DB7BABF88305F1084E9D60AA7744CB349EC9CF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636D994
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: a94dcb164fd652c001cd74f76ff14c32904faeb7d489bb1bcb4dda532dd854f0
                                                                                • Instruction ID: d89515fc7b8d0944f4804ac91bdfed583f3ad1148e0a08e824f0e3875c6730a2
                                                                                • Opcode Fuzzy Hash: a94dcb164fd652c001cd74f76ff14c32904faeb7d489bb1bcb4dda532dd854f0
                                                                                • Instruction Fuzzy Hash: F3C15F74A01228CFCB64DF21D99469DB7BABF88305F1084E9D60A97744CB349ECACF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05594216
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 7f1c9ffad91acedcd5d8902e0624d4a77f419057c32e61eb4f20f793de39ff23
                                                                                • Instruction ID: b76b132f65d947284be69144362e9fb7eaa2d169c0a0af0c2e69f9d23bd82a0d
                                                                                • Opcode Fuzzy Hash: 7f1c9ffad91acedcd5d8902e0624d4a77f419057c32e61eb4f20f793de39ff23
                                                                                • Instruction Fuzzy Hash: EDB16B74B006058FCF08EF69C49566EBBF2FF88314B11896AD50ADB751DB78EC068B91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 633b92e795d1d4efcf7b83acf0fb538a22b5fb43308944575547cc7d9ee3cdf5
                                                                                • Instruction ID: 1d78df7e47c5e0ba3033e259daaf7349b62c2aedfa58d5d78e05b6e690a618c6
                                                                                • Opcode Fuzzy Hash: 633b92e795d1d4efcf7b83acf0fb538a22b5fb43308944575547cc7d9ee3cdf5
                                                                                • Instruction Fuzzy Hash: 4EB14F74A01228CFCB64DF21D95469DB7BABF88306F1084E9D60A97744CB349ECACF95
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 6fa271b2c6f888f9679e71a1f55d6d8f13f7877eda11eb20c1fdf3f2650109a1
                                                                                • Instruction ID: ba8092d7317dd4d41da72df1c9056a88dd73bba21ac1029ec8ef4c138b5c9748
                                                                                • Opcode Fuzzy Hash: 6fa271b2c6f888f9679e71a1f55d6d8f13f7877eda11eb20c1fdf3f2650109a1
                                                                                • Instruction Fuzzy Hash: B7B16F74A01228CFCB64DF21D95469DB7BABF88305F1084E9D60A97744CB349ECACF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: d70f5189f2146906d96fbc27e46f562a8fb5a15b046ed9f91d572699c1a77307
                                                                                • Instruction ID: fda841d704c9011e536a3bcd90a968eaf41def04965d8303118415920d6aa6b7
                                                                                • Opcode Fuzzy Hash: d70f5189f2146906d96fbc27e46f562a8fb5a15b046ed9f91d572699c1a77307
                                                                                • Instruction Fuzzy Hash: 1FA15E74A01228CFCB64DF21D95469DB7BABF88305F1084E9D60AA7744CB349DCACF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 66308346920663d7450ee303c8099d21066f5afa9b734e2a7180fc7396b8f33d
                                                                                • Instruction ID: 20630d0a43a877c13a275e4c0252d68dd915001b149f5f3e3f7858d5a7368db5
                                                                                • Opcode Fuzzy Hash: 66308346920663d7450ee303c8099d21066f5afa9b734e2a7180fc7396b8f33d
                                                                                • Instruction Fuzzy Hash: D5A14DB4A01228CFCB64DF21D95469DB7BABF88305F1084E9D60AA7744CB349DCACF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: ee691ca9ff015e5e1b97bfbdf7c9b761abf55c79f62506f022f7f24da07bd633
                                                                                • Instruction ID: 33e9774ef04a816c1d72eda1858886e9f5290e498c762341d9a19c854a8f99b0
                                                                                • Opcode Fuzzy Hash: ee691ca9ff015e5e1b97bfbdf7c9b761abf55c79f62506f022f7f24da07bd633
                                                                                • Instruction Fuzzy Hash: 7DA14CB4A01228CFCB649F21D95479DB7B6BF88305F1084E9D60AA7745CB349DCACF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 141e109c12c7c0b9cf3d1b1b450992fbef41ed264da3f6dc01844e86021e8fec
                                                                                • Instruction ID: 60fe0b1f5eb3f5c6acec93b5402225bee4e4b59a727239aecf351e55c52cb5bf
                                                                                • Opcode Fuzzy Hash: 141e109c12c7c0b9cf3d1b1b450992fbef41ed264da3f6dc01844e86021e8fec
                                                                                • Instruction Fuzzy Hash: 5C914DB4A01228CFCB649F21D95479DB7B6BF88305F1084E9D60AA7745CB349DCACF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • KiUserExceptionDispatcher.NTDLL ref: 0636DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DispatcherExceptionUser
                                                                                • String ID:
                                                                                • API String ID: 6842923-0
                                                                                • Opcode ID: 9e845d3053d1173ac107a52d4d4d642c3cdbfb2f28db9010432afda59113d7d5
                                                                                • Instruction ID: d711f002da122861f303b954a941206637e94ac72d11a2645de9a83ef8c631ae
                                                                                • Opcode Fuzzy Hash: 9e845d3053d1173ac107a52d4d4d642c3cdbfb2f28db9010432afda59113d7d5
                                                                                • Instruction Fuzzy Hash: 0D917EB4A41228CFCB649F21D95479DB7B6BF88305F1084E9D60A97744CB349DCACF94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: 270f2a1a9018ac15bba6953ef6902abd90c9e4bfabd0e5052199ac6ec6c0addc
                                                                                • Instruction ID: 28e46b5dc9da6f26177e308805f4fdda1bd8316e088f989da33df9f4dc1c44e5
                                                                                • Opcode Fuzzy Hash: 270f2a1a9018ac15bba6953ef6902abd90c9e4bfabd0e5052199ac6ec6c0addc
                                                                                • Instruction Fuzzy Hash: FB51E630F003059FCB559BB4C858ABEB7B6EF85200F1185AAE905DB395DBB0DC45CB94
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: a5e2d9fcfa018280896b771290c89fd6ce871b0d108bb76cd6e03f82790444e0
                                                                                • Instruction ID: 0daf3426916c5e16e51463a211b686e2e49a0ea00410a6f33b41d21996d4d3a0
                                                                                • Opcode Fuzzy Hash: a5e2d9fcfa018280896b771290c89fd6ce871b0d108bb76cd6e03f82790444e0
                                                                                • Instruction Fuzzy Hash: 6351A131F402059BCB54EFB4C998AEEB7B6BF85204F058969E516EB784DF70E844CB90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: 93df96cfbb22c7d6c5309c32742d3439e367499fda7722c2107701f27ed74ad2
                                                                                • Instruction ID: 527b2872092c1f1eafda84d8a54ca82084eb8a77865f1e8b470add6449a246f2
                                                                                • Opcode Fuzzy Hash: 93df96cfbb22c7d6c5309c32742d3439e367499fda7722c2107701f27ed74ad2
                                                                                • Instruction Fuzzy Hash: 59218970A113489FCB55CF74D488BAEBBB2FF45304F1184ACD801AB251DB759985CF91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.514130638.0000000006750000.00000040.00000001.sdmp, Offset: 06750000, based on PE: false
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: 82743b77dceae2fa578849814c5fdca5b2dda69763718485cb8d200a8ca46036
                                                                                • Instruction ID: 3fcee921b979fcfca4aee8b3a82c949db0f29815ba764517daa2ea2b1b13d074
                                                                                • Opcode Fuzzy Hash: 82743b77dceae2fa578849814c5fdca5b2dda69763718485cb8d200a8ca46036
                                                                                • Instruction Fuzzy Hash: F7214570E00309DFDB55DFA5D498BAEBBB1FB48304F2188A8D402BB250DBB59985CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05594216
                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.512525288.0000000005590000.00000040.00000001.sdmp, Offset: 05590000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 83205000129cc7094f0f7ad38a5e3c3ecd059162bc8f57762a0f48048a915f4b
                                                                                • Instruction ID: c4bffd60fba0e5487c226410df451f87ddc3571e9c50844ee1815a4b05dabab5
                                                                                • Opcode Fuzzy Hash: 83205000129cc7094f0f7ad38a5e3c3ecd059162bc8f57762a0f48048a915f4b
                                                                                • Instruction Fuzzy Hash: 6C0135F59046848FDF14CF8AD44038ABBF0FF99318F24829AC449A7252D3399547CB55
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.506070951.0000000002EAD000.00000040.00000001.sdmp, Offset: 02EAD000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 286c52279921ffbed2755e627f398a7a33c7bcac67a83074f80cae5f542bb1a2
                                                                                • Instruction ID: 47c36ced1675a822451bbf7e3b44e8b8c8278319e67f4cb932106d662cdcf383
                                                                                • Opcode Fuzzy Hash: 286c52279921ffbed2755e627f398a7a33c7bcac67a83074f80cae5f542bb1a2
                                                                                • Instruction Fuzzy Hash: D92145B2544244EFDB05DF04DCD0B6ABF65FB88328F24C669E8054F646C336E816CBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.506124401.0000000002EBD000.00000040.00000001.sdmp, Offset: 02EBD000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9f303b917e8f48b84cdcc6cd5903f270423d22a581d96ef4b045d65975da3e24
                                                                                • Instruction ID: 3a08f1c8cf3651786a838c2c2f9f5245093336907fb3eeff512fbe93ef625ade
                                                                                • Opcode Fuzzy Hash: 9f303b917e8f48b84cdcc6cd5903f270423d22a581d96ef4b045d65975da3e24
                                                                                • Instruction Fuzzy Hash: 6F2137B1544244DFDB16CF14D8C0B97BB66FF88318F24C569D8494B246C33AD807CB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.506124401.0000000002EBD000.00000040.00000001.sdmp, Offset: 02EBD000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fffcbe8f8f0bc2828685ef3404b5fc9ceffb4c69e195572385ac47d473370632
                                                                                • Instruction ID: c413f82e4a3bbeb19170d61e481807ac847f06b05ce7e70ed92a6c0140f6d4d8
                                                                                • Opcode Fuzzy Hash: fffcbe8f8f0bc2828685ef3404b5fc9ceffb4c69e195572385ac47d473370632
                                                                                • Instruction Fuzzy Hash: C12192755493C08FCB03CF20D990756BF71EF46214F28C5DAD8498B697C33A980ACB62
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.506070951.0000000002EAD000.00000040.00000001.sdmp, Offset: 02EAD000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                                • Instruction ID: a8b3b97717dc2f3c7758b8365741763205750236a95b6e73310519d7fb529826
                                                                                • Opcode Fuzzy Hash: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                                • Instruction Fuzzy Hash: 9E11D376544284CFCB06CF14D9D4B16BF72FB88328F24C6A9D8094F656C33AE45ACBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Non-executed Functions

                                                                                Memory Dump Source
                                                                                • Source File: 00000003.00000002.513879331.0000000006360000.00000040.00000001.sdmp, Offset: 06360000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4b98b55b24a1ea44c67c432280f9a3a6f9a1a6f07a62ef75c2260f43fa35406c
                                                                                • Instruction ID: abd4714d2aa1a51019b312a398fdfae7356a3576c530fe5ddbbe0d799bf87ef8
                                                                                • Opcode Fuzzy Hash: 4b98b55b24a1ea44c67c432280f9a3a6f9a1a6f07a62ef75c2260f43fa35406c
                                                                                • Instruction Fuzzy Hash: 60317234A046459FCB54DF6AC48099EBBF5FF49210B14C62AE446E7B54EB30A859CBD0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Executed Functions

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 011CB730
                                                                                • GetCurrentThread.KERNEL32 ref: 011CB76D
                                                                                • GetCurrentProcess.KERNEL32 ref: 011CB7AA
                                                                                • GetCurrentThreadId.KERNEL32 ref: 011CB803
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 21306c581160338f4e181d635c5842193c004eb2c5f221db33cbfa028df71983
                                                                                • Instruction ID: a6cdb798db37d09627620406cf700957409e143a0cb47697ccf4ffc91b8839df
                                                                                • Opcode Fuzzy Hash: 21306c581160338f4e181d635c5842193c004eb2c5f221db33cbfa028df71983
                                                                                • Instruction Fuzzy Hash: 965164B09047888FDB14CFA9D588BDEBBF0EF49304F24845AE409B72A0C7349845CF66
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 011CB730
                                                                                • GetCurrentThread.KERNEL32 ref: 011CB76D
                                                                                • GetCurrentProcess.KERNEL32 ref: 011CB7AA
                                                                                • GetCurrentThreadId.KERNEL32 ref: 011CB803
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 359726ab71c1174c1bd985f56bf72e9d5c2fa6b7950ea254eaece12b6b41a32e
                                                                                • Instruction ID: 72b417bb4eb62f781d3eadd284aec7473b9e1a425f90d5deee6ff0d1875b39d5
                                                                                • Opcode Fuzzy Hash: 359726ab71c1174c1bd985f56bf72e9d5c2fa6b7950ea254eaece12b6b41a32e
                                                                                • Instruction Fuzzy Hash: 485133B09047888FDB14DFA9D688B9EBBF0EF48314F248559E409B73A0D774A844CF66
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 011CFE4A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: aaedfe401c6d25598662103ef0289a8e835571b3c58e56aa2c08012e7196fbd6
                                                                                • Instruction ID: 33b03d499b49a964405ac5c03f4a6f69a8dee9e53aa9d3336b02fcbd11dab44c
                                                                                • Opcode Fuzzy Hash: aaedfe401c6d25598662103ef0289a8e835571b3c58e56aa2c08012e7196fbd6
                                                                                • Instruction Fuzzy Hash: 6851CFB1D103599FDB14CFA9C884ADEBFB2BF88714F25812EE419AB210D7709946CF91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 011CFE4A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: d25deceb00511233f6df389a58cc93d97d6b712465ca56e82210c9ee0a1c9abd
                                                                                • Instruction ID: f07eca924e165b99ddb8b69ec2177d65fa56826c4b485e5f577744c0457f73b5
                                                                                • Opcode Fuzzy Hash: d25deceb00511233f6df389a58cc93d97d6b712465ca56e82210c9ee0a1c9abd
                                                                                • Instruction Fuzzy Hash: FD41DFB1D103599FDF14CF99C880ADEBFB6BF88714F25812AE419AB210D7709885CF91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 011C5421
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: ac4d2a6672bc016e4a9124f4601a949cd11daeae7bd8a4cba4095326fd78f580
                                                                                • Instruction ID: 67d5a7ad2f17e70869834534cf5c82079e98938787a5d9bdf482d1dfec29c7c6
                                                                                • Opcode Fuzzy Hash: ac4d2a6672bc016e4a9124f4601a949cd11daeae7bd8a4cba4095326fd78f580
                                                                                • Instruction Fuzzy Hash: CD41E270D0466CCBDB24DFA9C84478EBBB2FF58708F218059D408BB251E7756945CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 011C5421
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: 88bae4e69419104a3ae40e61d5a69b82499645ce7862b657a2cb1dd0652dbc0f
                                                                                • Instruction ID: ca2e7977d74632b5f420704429952bfbbb72e1bd25722910ca182b2646de1715
                                                                                • Opcode Fuzzy Hash: 88bae4e69419104a3ae40e61d5a69b82499645ce7862b657a2cb1dd0652dbc0f
                                                                                • Instruction Fuzzy Hash: AD41D271D0466CCBDB14DFA9C88478EBBB2FF58308F218159D408AB250E775694ACF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetSystemMetrics.USER32(0000004B), ref: 011C7E3D
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 4116985748-0
                                                                                • Opcode ID: 212bf7d4468959a8879fee2a43e8ff7419f42803c298643590ab89d55a040505
                                                                                • Instruction ID: 10a7e18dc32874026dfa1c743b33de786b1a97c19cde7492e247c87c7a81d04f
                                                                                • Opcode Fuzzy Hash: 212bf7d4468959a8879fee2a43e8ff7419f42803c298643590ab89d55a040505
                                                                                • Instruction Fuzzy Hash: B6312F75A043848EDB25CFE9E4443EABFF5EB14708F08446EE494AB282D7789985CF61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 011C9916
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: e4ba7302d413a6e849f05d8fc02777787c2fd3588afb3a3a2eddf2353ee4cb62
                                                                                • Instruction ID: 75f55aa17db92e4368ad130f2331c2363a994a9556d55b67ced0e6abafd708ef
                                                                                • Opcode Fuzzy Hash: e4ba7302d413a6e849f05d8fc02777787c2fd3588afb3a3a2eddf2353ee4cb62
                                                                                • Instruction Fuzzy Hash: A7217CB1C093998FDB16CF69C8406DEBFB4EF5A314F05809BC454EB252D338950ACBA2
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,011C9991,00000800,00000000,00000000), ref: 011C9BA2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 8e298000b8d5bf163fee794dd2584a9e585f9dc9cebfc6534ffeaf99150bda6b
                                                                                • Instruction ID: 21a585eb575bacaf5617bb4a824517f95bce4f1108b4c6ac659fe7b4a7525112
                                                                                • Opcode Fuzzy Hash: 8e298000b8d5bf163fee794dd2584a9e585f9dc9cebfc6534ffeaf99150bda6b
                                                                                • Instruction Fuzzy Hash: 83217AB6804298DFDB14CF9AC484BDEBBB4EB69714F15846ED455B7600C3349506CFA2
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011CB97F
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 5811fce83eecbe5d37efbbefa16f7cd6b94ce2cd3c8308781419df6944e4b82a
                                                                                • Instruction ID: 37cd072a446a62d017d6e257795d98d951083a038ed2b27ed65193b676429fdb
                                                                                • Opcode Fuzzy Hash: 5811fce83eecbe5d37efbbefa16f7cd6b94ce2cd3c8308781419df6944e4b82a
                                                                                • Instruction Fuzzy Hash: 4C2100B5D012489FDB00CFA9D884ADEBFF4EB48320F14842AE958B3310D374AA44DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011CB97F
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 790a387a1f25d7818976a35e3753519dbb9d0d756f29acfe714577d5ed6089a6
                                                                                • Instruction ID: 3258a5b1290a7f50e7bb851c51fa6d53c75541a5bcb085c4b6fca0aabda9536c
                                                                                • Opcode Fuzzy Hash: 790a387a1f25d7818976a35e3753519dbb9d0d756f29acfe714577d5ed6089a6
                                                                                • Instruction Fuzzy Hash: 4721E2B5D002489FDB10CFA9D984ADEBBF8FB48324F14801AE958B3310D374A944DFA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,011C9991,00000800,00000000,00000000), ref: 011C9BA2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 78ded33d985fb16e4659e968092c7472613f19156e33edbdfb3e42c60919db87
                                                                                • Instruction ID: 4ee4fc04c039fefcad17239ce2dbcb10b5917c55bde63299a00dadca2da46fd4
                                                                                • Opcode Fuzzy Hash: 78ded33d985fb16e4659e968092c7472613f19156e33edbdfb3e42c60919db87
                                                                                • Instruction Fuzzy Hash: A21112B29002489FDB14CF9AC484BDEFBF4EB98724F15846EE915B7200C774A945CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,011C9991,00000800,00000000,00000000), ref: 011C9BA2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: b0d97b4d041cae5886e935740dabb69cf0d58075c2ebdb5f407b18b9143d5d48
                                                                                • Instruction ID: a8545db4919f7df6ad3fc03d08fbc9936d82032a0d38a812aecf91f3e9d8fff6
                                                                                • Opcode Fuzzy Hash: b0d97b4d041cae5886e935740dabb69cf0d58075c2ebdb5f407b18b9143d5d48
                                                                                • Instruction Fuzzy Hash: CB1100B29002499FDB14CFAAC484BDEFBF4AF98724F14846ED959A7200C375A945CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 011C9916
                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.333252796.00000000011C0000.00000040.00000001.sdmp, Offset: 011C0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 2dba0f69881844b801febd73cece06a167a649ca46839e9417b583217c350053
                                                                                • Instruction ID: d60a103ea48cbc1d209201c62bcb297a63cd5c104ec808c017e6512ad797f7b4
                                                                                • Opcode Fuzzy Hash: 2dba0f69881844b801febd73cece06a167a649ca46839e9417b583217c350053
                                                                                • Instruction Fuzzy Hash: 4B110FB1D006498FDB14CF9AC484ADEFBF4EB88324F14845AD429B7200D374A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.332586023.0000000000CED000.00000040.00000001.sdmp, Offset: 00CED000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 66c680a159521eeb0fc86d1ad6de194903a61fd455e30863275fe2907a7813fa
                                                                                • Instruction ID: a17cf6ead17d3f909db0aa09e6510fef0aa3f3bf29acd59025976ec9c1b5acfa
                                                                                • Opcode Fuzzy Hash: 66c680a159521eeb0fc86d1ad6de194903a61fd455e30863275fe2907a7813fa
                                                                                • Instruction Fuzzy Hash: 6E2126B1604384DFDB14DF15D9C0B2ABB65FB88314F28C669E94A4B246C33BD847DB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.332586023.0000000000CED000.00000040.00000001.sdmp, Offset: 00CED000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 06eca0bcdee4c1fb9863cb29d6793b88246c63713331241c7df48fa264f1c329
                                                                                • Instruction ID: 93ad030d9dc92da245bda1e60bb80fcdc995bca6d1b9290de608b50dfcaeb093
                                                                                • Opcode Fuzzy Hash: 06eca0bcdee4c1fb9863cb29d6793b88246c63713331241c7df48fa264f1c329
                                                                                • Instruction Fuzzy Hash: 812129B5904284EFDB01DF11D5C0B2ABB65FB84314F24C6ADEA4A4B246C33ADC46DB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.332586023.0000000000CED000.00000040.00000001.sdmp, Offset: 00CED000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 35e20c69cbcb07d5f36ace82f0c482ef0507152a492aad21ebb3fad15f097447
                                                                                • Instruction ID: f8528b42f906f2ff5bf89e163eb59a4adbf32edac795b06a293f4c55b69d5491
                                                                                • Opcode Fuzzy Hash: 35e20c69cbcb07d5f36ace82f0c482ef0507152a492aad21ebb3fad15f097447
                                                                                • Instruction Fuzzy Hash: C3219F755093C08FCB02CF20D990B15BF71EB46314F28C5EAD8498B6A7C33A980ACB62
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 0000000D.00000002.332586023.0000000000CED000.00000040.00000001.sdmp, Offset: 00CED000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9d35afff73f64a3ce4a9ad24b32e567c7a1d94a238c24113185269c1f0cd325c
                                                                                • Instruction ID: 466da11a2b06ce360dc7a9a6a3814fd9c78c32a97ae9a8fa59bf70584c895ee3
                                                                                • Opcode Fuzzy Hash: 9d35afff73f64a3ce4a9ad24b32e567c7a1d94a238c24113185269c1f0cd325c
                                                                                • Instruction Fuzzy Hash: 33119D75904284DFDB11CF10D5C4B15FBB1FB84324F28C6ADD94A4B696C33AD94ACB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Non-executed Functions

                                                                                Executed Functions

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 01276BB0
                                                                                • GetCurrentThread.KERNEL32 ref: 01276BED
                                                                                • GetCurrentProcess.KERNEL32 ref: 01276C2A
                                                                                • GetCurrentThreadId.KERNEL32 ref: 01276C83
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID: S$S
                                                                                • API String ID: 2063062207-2452727827
                                                                                • Opcode ID: 77d5ba09d69de8c37018ae742a00a9f83d9afe522b31375e345604435a529b1c
                                                                                • Instruction ID: fd9d6d7df1c7f407ffc743a772c2fe3352f66bbe5cd6ef0cf46f13d67720837a
                                                                                • Opcode Fuzzy Hash: 77d5ba09d69de8c37018ae742a00a9f83d9afe522b31375e345604435a529b1c
                                                                                • Instruction Fuzzy Hash: CB5187B0D057898FEB00CFA9D54879EBFF0AF49314F14849AE058B72A1DB745888CB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 01276BB0
                                                                                • GetCurrentThread.KERNEL32 ref: 01276BED
                                                                                • GetCurrentProcess.KERNEL32 ref: 01276C2A
                                                                                • GetCurrentThreadId.KERNEL32 ref: 01276C83
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: cd7917f6f8f939415851a0f4586aaf60800d8ed1ff63899bdcd833f0528e7b37
                                                                                • Instruction ID: f147b7f4c2aac101671167651415172571cf4814086a240f2e40a4a5750b3361
                                                                                • Opcode Fuzzy Hash: cd7917f6f8f939415851a0f4586aaf60800d8ed1ff63899bdcd833f0528e7b37
                                                                                • Instruction Fuzzy Hash: 735133B09107898FEB14CFA9C648BAEBBF0EF48314F248459E519B7390DB746984CB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05E9B62B
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.365456348.0000000005E90000.00000040.00000001.sdmp, Offset: 05E90000, based on PE: false
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID:
                                                                                • API String ID: 2645101109-0
                                                                                • Opcode ID: 1fc58a14355680e03a55c48d2c1fc81e7379ceac7d75bfa60c1cf8450b76f06c
                                                                                • Instruction ID: 9f40b536795eb74c131798a1a97436df87c1324bfa530239eddf8d543c94c2c0
                                                                                • Opcode Fuzzy Hash: 1fc58a14355680e03a55c48d2c1fc81e7379ceac7d75bfa60c1cf8450b76f06c
                                                                                • Instruction Fuzzy Hash: A95133B0D142589FDF08CFA9D885BEDBBB5BF48314F048029D896AB351D774A844CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05E9B62B
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.365456348.0000000005E90000.00000040.00000001.sdmp, Offset: 05E90000, based on PE: false
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID:
                                                                                • API String ID: 2645101109-0
                                                                                • Opcode ID: 3f2253c0f07f270c77f1e1941dc328ac0784fafda3684b0b21b2ea3291b8dcc2
                                                                                • Instruction ID: 52bc95b0e1acf0497a9992cc7a731d4209b2fa44316a08e7cca9f91c834ead38
                                                                                • Opcode Fuzzy Hash: 3f2253c0f07f270c77f1e1941dc328ac0784fafda3684b0b21b2ea3291b8dcc2
                                                                                • Instruction Fuzzy Hash: 26512270D142588FDF18CFA9D885BEEBBB6BF48314F148129E856BB351D774A844CB90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 012752A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: 8a5d21354aab690513ef628f6dc5dcac1f593852a72145f718f1b6ed1dedfbd7
                                                                                • Instruction ID: 2f5268984df08c852598f3aede593a7ee05bb81cf83005cc452fef05171dda31
                                                                                • Opcode Fuzzy Hash: 8a5d21354aab690513ef628f6dc5dcac1f593852a72145f718f1b6ed1dedfbd7
                                                                                • Instruction Fuzzy Hash: 4B51BEB1D103499FDB14CFA9D984ADEFFB5BF48314F64812AE819AB210D774A885CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 012752A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: 2ef68971d973708d0af08b32c051ef266aa220139bc40d63d3bc0e2403e8c69b
                                                                                • Instruction ID: d57afdecb76bed748c31e880be3b7159397636ddac9a2e64134ff638e96d9887
                                                                                • Opcode Fuzzy Hash: 2ef68971d973708d0af08b32c051ef266aa220139bc40d63d3bc0e2403e8c69b
                                                                                • Instruction Fuzzy Hash: AB41CFB1D103499FDF14CF99C884ADEFBB5BF48314F24812AE819AB210D7749885CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 01277D01
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CallProcWindow
                                                                                • String ID:
                                                                                • API String ID: 2714655100-0
                                                                                • Opcode ID: 75c51120aad8223570098cf413278d3d82047b61478d4d017f1423b0cae80294
                                                                                • Instruction ID: 166d529441fa187848c3794cd2be3ed6523ccaa4fd4ff85e8cee2b8df99c3569
                                                                                • Opcode Fuzzy Hash: 75c51120aad8223570098cf413278d3d82047b61478d4d017f1423b0cae80294
                                                                                • Instruction Fuzzy Hash: CA4145B5A103498FDB04CF99C488AAFBBF5FF88314F258559E519AB321D774A841CFA0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0127C442
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: EncodePointer
                                                                                • String ID:
                                                                                • API String ID: 2118026453-0
                                                                                • Opcode ID: 83805300a64283241ee60aabfcd610703e1042f85f05a38c117c7fba68f3e861
                                                                                • Instruction ID: a3bf6b061668650a9aa4fda0ac05c3b7a37b5754cf9c7d55dc1145b2385ddffe
                                                                                • Opcode Fuzzy Hash: 83805300a64283241ee60aabfcd610703e1042f85f05a38c117c7fba68f3e861
                                                                                • Instruction Fuzzy Hash: 7731A1B1815386CFEB10DFA8E54939EBFF4EB05318F14805AE449A7341C7796945CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01276DFF
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 23a9f64e152769ab35c6f991fc071c45f3128b318b7b8ec7f85af7cecafe2e25
                                                                                • Instruction ID: b6290377f854168cf35cb5165a549c80bc52984302905196153f82ca6e890521
                                                                                • Opcode Fuzzy Hash: 23a9f64e152769ab35c6f991fc071c45f3128b318b7b8ec7f85af7cecafe2e25
                                                                                • Instruction Fuzzy Hash: 3C21EEB5D002489FDB00CFA9D984AEEBBF4EF48324F14841AE914B7310D378AA54DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01276DFF
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 62fc1c61411060cdc53d35e3e863dd6531178b66102f161e6214629e957fe080
                                                                                • Instruction ID: c13a53da9b5a2fac74486b19fccf36cdbe8b42bfa34fc4a5e093fdad374e659b
                                                                                • Opcode Fuzzy Hash: 62fc1c61411060cdc53d35e3e863dd6531178b66102f161e6214629e957fe080
                                                                                • Instruction Fuzzy Hash: 4321E2B5D002489FDB10CFA9D884ADEBBF8EB48324F14841AE914B3310D374A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0127C442
                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361863951.0000000001270000.00000040.00000001.sdmp, Offset: 01270000, based on PE: false
                                                                                Similarity
                                                                                • API ID: EncodePointer
                                                                                • String ID:
                                                                                • API String ID: 2118026453-0
                                                                                • Opcode ID: f805d88250d882ac77b7c62fc5c24008b267f7dd026826e38890eaa7f26f878b
                                                                                • Instruction ID: 844fba922c11b1cbc73e9e4902c15cbfc4dc1458235f86db4949f8ad527cfcfd
                                                                                • Opcode Fuzzy Hash: f805d88250d882ac77b7c62fc5c24008b267f7dd026826e38890eaa7f26f878b
                                                                                • Instruction Fuzzy Hash: 11119DB19113468FDB20DFA9D54979EBBF4EB48314F20842AE409B3640CB386944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361272946.0000000000F1D000.00000040.00000001.sdmp, Offset: 00F1D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e284c14db03261bd9bc16f42c4e939627eaadfada5c6b2a07712eb1fb1462d39
                                                                                • Instruction ID: 662303353c111e584adb4cba15f257090ff80ebd60eeb909ecff6ad57decf6f5
                                                                                • Opcode Fuzzy Hash: e284c14db03261bd9bc16f42c4e939627eaadfada5c6b2a07712eb1fb1462d39
                                                                                • Instruction Fuzzy Hash: F52125B2904244EFDB14DF14D8C0B6BBF76FB88324F24C569E9054B246C336E885EBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361319028.0000000000F2D000.00000040.00000001.sdmp, Offset: 00F2D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 364a046a0ce2866cddcf6ba3a7f9e61d92a542516a26070564624331e0656a9b
                                                                                • Instruction ID: 4e6c6a3e6f1e94aeee42d62952e365617a9183788ff60c3d8d59321f508a55ca
                                                                                • Opcode Fuzzy Hash: 364a046a0ce2866cddcf6ba3a7f9e61d92a542516a26070564624331e0656a9b
                                                                                • Instruction Fuzzy Hash: C72129B1908244DFDB14DF14E4C0B1ABB65FB84324F24C569D9494B25AC73AD847EB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361319028.0000000000F2D000.00000040.00000001.sdmp, Offset: 00F2D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: baab0870f12a77f5890aa6b56d3daa0e7a2c743cca25437166d8a78b63f5e291
                                                                                • Instruction ID: aa73e2ad0f2d93be1d1b5f33c255074bb77fdd5e4f32c2e11835c0b2ca6eedee
                                                                                • Opcode Fuzzy Hash: baab0870f12a77f5890aa6b56d3daa0e7a2c743cca25437166d8a78b63f5e291
                                                                                • Instruction Fuzzy Hash: 0E2195759093C08FCB12CF24D590715BF71EF46324F28C5DAD8458B6A7C33A980ADB62
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000011.00000002.361272946.0000000000F1D000.00000040.00000001.sdmp, Offset: 00F1D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                                • Instruction ID: 1640957b43aacebe676d9239e89951623e3b64bda50293cfc9b46986f4784d41
                                                                                • Opcode Fuzzy Hash: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                                • Instruction Fuzzy Hash: D211B176904280CFDB15CF14D9C4B56BF72FB84324F28C6A9D8050B656C33AD89ADBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Non-executed Functions

                                                                                Executed Functions

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 027EB730
                                                                                • GetCurrentThread.KERNEL32 ref: 027EB76D
                                                                                • GetCurrentProcess.KERNEL32 ref: 027EB7AA
                                                                                • GetCurrentThreadId.KERNEL32 ref: 027EB803
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 280670639ce01386fca9b466a2084f1f40e8b8bb9318adebb9eac90668cfb7ad
                                                                                • Instruction ID: 19ec83a213aeef807595a1b89f0f728d410ed0e901e6192d3ce351091f9bbe05
                                                                                • Opcode Fuzzy Hash: 280670639ce01386fca9b466a2084f1f40e8b8bb9318adebb9eac90668cfb7ad
                                                                                • Instruction Fuzzy Hash: 945144B49057898FDB10CFA9C588B9EBFF1BF49308F18849AE409A7390C7745848CF65
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 027EB730
                                                                                • GetCurrentThread.KERNEL32 ref: 027EB76D
                                                                                • GetCurrentProcess.KERNEL32 ref: 027EB7AA
                                                                                • GetCurrentThreadId.KERNEL32 ref: 027EB803
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 2223a51a795190e6ac97f0cf9a98d27696a5306aba49bcb804b4e4605374b26c
                                                                                • Instruction ID: 55d5179181a20b3105ab5625264264e57284b0b1a277f5233cbdca6e0846e561
                                                                                • Opcode Fuzzy Hash: 2223a51a795190e6ac97f0cf9a98d27696a5306aba49bcb804b4e4605374b26c
                                                                                • Instruction Fuzzy Hash: CF5133B4E006898FDB10CFA9D588B9EBBF1BF49318F24845AE41AB7390D7745848CF65
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 06ABAA4B
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: df55e5b1caf6808ffb49e8f6c8b0cff4af4bcc5ae04f9afbee4ef24f2346aa89
                                                                                • Instruction ID: 91c1a74b1fe4953c71493648aa7a71c7d3f41b9998ada8dc2200d74e3df17713
                                                                                • Opcode Fuzzy Hash: df55e5b1caf6808ffb49e8f6c8b0cff4af4bcc5ae04f9afbee4ef24f2346aa89
                                                                                • Instruction Fuzzy Hash: 97511571D003689FDB64DF95C880BDDBBB6EF48304F15849AE548B7210DB31AA88DF51
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 06ABAA4B
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: f0f4eafaebf6b3ad7af0d39b6f430fe46b4a5135f04cbd05b2b16b8e948b27ee
                                                                                • Instruction ID: 2eb224a5dab88232c4a8b41dd97ea849eb2728ccc970c7512ba6fad6deb7c050
                                                                                • Opcode Fuzzy Hash: f0f4eafaebf6b3ad7af0d39b6f430fe46b4a5135f04cbd05b2b16b8e948b27ee
                                                                                • Instruction Fuzzy Hash: D351F471D003699FDB64DF95C880BDDBBB5EF48304F15849AE908B7250DB31AA88DF61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027EFE4A
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: 02ea3885d181fac49fd7fa2248649cf2c2675139a200322427ab4e0143bcc36f
                                                                                • Instruction ID: c8abfe700506ba8610adc8e05096c0641d4343e3ea5f560a545cbe3d2b3a904e
                                                                                • Opcode Fuzzy Hash: 02ea3885d181fac49fd7fa2248649cf2c2675139a200322427ab4e0143bcc36f
                                                                                • Instruction Fuzzy Hash: 8951DFB1D103499FDF15DFA9C880ADEBFB1BF88314F24812AE419AB610D770A985CF91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027EFE4A
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: CreateWindow
                                                                                • String ID:
                                                                                • API String ID: 716092398-0
                                                                                • Opcode ID: 9d56888d9c03c2488887af86f513f6a23b96c86238624fc6ff7f1197972ea692
                                                                                • Instruction ID: 8b8134ac7439c297761c0cdb79bee383af36b1ed39362940e0a3e770eb88bc57
                                                                                • Opcode Fuzzy Hash: 9d56888d9c03c2488887af86f513f6a23b96c86238624fc6ff7f1197972ea692
                                                                                • Instruction Fuzzy Hash: 3D41E0B1D103489FDF14DF99C880ADEBFB5BF88314F24812AE419AB610D770A885CF91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 027E5421
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: a8cb3de5aaaad69e0b43bd9a1acec872201c74d01e2d5f362f0c1dc60837bd4c
                                                                                • Instruction ID: e52a13bc25caaa1327ca7fcb57942ad56cfae761395000cd11b269f47e6c3b83
                                                                                • Opcode Fuzzy Hash: a8cb3de5aaaad69e0b43bd9a1acec872201c74d01e2d5f362f0c1dc60837bd4c
                                                                                • Instruction Fuzzy Hash: 8341E170C0476CCADF14CFA9C844A8EBBB5BF49308F55806AD409BB251E7756949CFA0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 027E5421
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: 9efa36c35279f2b2a9b08c65bfb5a0bf8bd03cd5736a26c71d56d370a3eeffcf
                                                                                • Instruction ID: da49443879a060d158ca151d41e78139f13b3c3815acab9b4b7ac041e1a78fea
                                                                                • Opcode Fuzzy Hash: 9efa36c35279f2b2a9b08c65bfb5a0bf8bd03cd5736a26c71d56d370a3eeffcf
                                                                                • Instruction Fuzzy Hash: 8A41E070C0462CCADF24CFA9C844B8EBBB5BF49308F55806AD409BB251EB756949CFA0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetSystemMetrics.USER32(0000004B), ref: 027E7E3D
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 4116985748-0
                                                                                • Opcode ID: e4909de01ee446b00161daf5e947e3651fc0b9ed5fb502c2b9ddd2e23d55019a
                                                                                • Instruction ID: e856227d08c56df96b9f7838c035f4f84843cb85bb90496d12da746ec699341e
                                                                                • Opcode Fuzzy Hash: e4909de01ee446b00161daf5e947e3651fc0b9ed5fb502c2b9ddd2e23d55019a
                                                                                • Instruction Fuzzy Hash: 5131DE749097C48EEB12DF65A4843FABFF4AF0A304F48489AC085AB2C6C7784959CF71
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,027E9991,00000800,00000000,00000000), ref: 027E9BA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 565126a8d71729ad1502cb3f0c6367feac6970ab567123de35957adb3d373f7a
                                                                                • Instruction ID: 1cedf5f0a851827a2ffdb9db5193f62979284eacf249c1758f9f8019424ed808
                                                                                • Opcode Fuzzy Hash: 565126a8d71729ad1502cb3f0c6367feac6970ab567123de35957adb3d373f7a
                                                                                • Instruction Fuzzy Hash: 65319AB2808385CFCF11CFA9C484ACEBFF0AF4A254F0684AAC555EB250D3B49545CBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06ABAE05
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: bbbf6b645a5e5a111672feb374b25adfd3b1c9ebef359335d008cdbf2c53fdeb
                                                                                • Instruction ID: b79c787b9a026511a87ee3d30ff59860919b74449f61bfb570057f0cd1288195
                                                                                • Opcode Fuzzy Hash: bbbf6b645a5e5a111672feb374b25adfd3b1c9ebef359335d008cdbf2c53fdeb
                                                                                • Instruction Fuzzy Hash: B2212FB1A00259DFCB10CFA9D885BDEBBF4FF48314F00842AE918A7251D738A944DBA0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06ABAE05
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: 2dbb62f4e18ee933173c48bc359866dfe599f7530bdc003ddcdac75b4536f443
                                                                                • Instruction ID: 61a388f739a8c035d04b3ce00d78412f3354b24072c0ea5661470c2c2ab09d29
                                                                                • Opcode Fuzzy Hash: 2dbb62f4e18ee933173c48bc359866dfe599f7530bdc003ddcdac75b4536f443
                                                                                • Instruction Fuzzy Hash: 242112B1900259DFCB10CF9AD885BDEBBF8FF48314F00842AE918A7251D778A944DBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027EB97F
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 14cee86c5fa0dfee5ab2c7659ab77ad4a594143638efc34cd6e7d90a94c38a16
                                                                                • Instruction ID: 3df35e8d9066d18be6e814212b52a6064ab324382a8185a57bf3f3455d5c11bd
                                                                                • Opcode Fuzzy Hash: 14cee86c5fa0dfee5ab2c7659ab77ad4a594143638efc34cd6e7d90a94c38a16
                                                                                • Instruction Fuzzy Hash: AD21F2B59002489FDB10CFA9D884ADEBFF8FF48324F14842AE954A7310D374A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027EB97F
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: a4c82a34b6e82958128144e01d4257a52c1ac88b58393d8c319dd3323c0e83ed
                                                                                • Instruction ID: de6c787a30d14d0931461260c9e4d757010471c3f47234f3923e96723b688d1a
                                                                                • Opcode Fuzzy Hash: a4c82a34b6e82958128144e01d4257a52c1ac88b58393d8c319dd3323c0e83ed
                                                                                • Instruction Fuzzy Hash: 4D21E0B59002489FDB10CFA9D984ADEBBF8FB48324F15841AE954B7310D374A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06ABAC7F
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: 38863f298e84c7143f3fccbeedc863b5a67df3a74d67ea801f1eb6424d94540e
                                                                                • Instruction ID: feab658933fdcff8f2663972daf104a9c560b030704996bd83d09c5c23c50561
                                                                                • Opcode Fuzzy Hash: 38863f298e84c7143f3fccbeedc863b5a67df3a74d67ea801f1eb6424d94540e
                                                                                • Instruction Fuzzy Hash: E421D0B19012599FCB10CF9AD884ADEBBF4FB48324F14842AE918A7250D374A944DBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06ABAC7F
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: 14c36f791c213797ce8eeb9fa5c477c052cf54875bade56162d7bf66cea6aeec
                                                                                • Instruction ID: 983fe11317c0afa31544d6abca3334fec7e42f9fe8970f11412a89c0c2fb0707
                                                                                • Opcode Fuzzy Hash: 14c36f791c213797ce8eeb9fa5c477c052cf54875bade56162d7bf66cea6aeec
                                                                                • Instruction Fuzzy Hash: 6A21F0B5D012599FCB10CF99C984BDEBBF4FF48310F14842AE918A7251D334A944DFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 06ABABB7
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ContextThread
                                                                                • String ID:
                                                                                • API String ID: 1591575202-0
                                                                                • Opcode ID: 38f06cbee6c8bd541ef4d064881123a315a907b7fbc22471f089a129fe51358c
                                                                                • Instruction ID: f15764b7c073224db9e29e1620804c9d510b1209955c4444959ac8684d656172
                                                                                • Opcode Fuzzy Hash: 38f06cbee6c8bd541ef4d064881123a315a907b7fbc22471f089a129fe51358c
                                                                                • Instruction Fuzzy Hash: 762156B5D002598FCB00CF9AC885BEEFBB4FB08224F45812AD428B3241D778A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 06ABABB7
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ContextThread
                                                                                • String ID:
                                                                                • API String ID: 1591575202-0
                                                                                • Opcode ID: a6d8c87f5b494c848b7fa279ab4ff1bbdd7a9800aad52ea9a87e62268489dc2f
                                                                                • Instruction ID: 5ca379baff916a7ae72779dea7ed460bd3aee735fcb15f3bd0e86736286293ac
                                                                                • Opcode Fuzzy Hash: a6d8c87f5b494c848b7fa279ab4ff1bbdd7a9800aad52ea9a87e62268489dc2f
                                                                                • Instruction Fuzzy Hash: C52124B1D006599BCB00CF9AC884BDEFBB8FB48224F44812AD418B3241D778A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,027E9991,00000800,00000000,00000000), ref: 027E9BA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 20a7715b6a7db253c7923f993dc733a32ef6d8b0c3aab7df3c33c4a428da1357
                                                                                • Instruction ID: b1bb9cac3c4b3b017cc69659c1d45916562337a8a6228809015cbd520500e932
                                                                                • Opcode Fuzzy Hash: 20a7715b6a7db253c7923f993dc733a32ef6d8b0c3aab7df3c33c4a428da1357
                                                                                • Instruction Fuzzy Hash: 1C1100B69002488FCF10CF9AC444ADEFBF4AB88324F05842AE916B7200C3B4A945CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,027E9991,00000800,00000000,00000000), ref: 027E9BA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: ab39dfe07331a8a13992849a3856221d25ace1b3f6db2d9bed3dac75fff860ab
                                                                                • Instruction ID: 5338957c7568b1e14619f4b62f9c28c548a8d4a592e56986ab635f4dc376bbe7
                                                                                • Opcode Fuzzy Hash: ab39dfe07331a8a13992849a3856221d25ace1b3f6db2d9bed3dac75fff860ab
                                                                                • Instruction Fuzzy Hash: 1A11F2B29002898FCB10CFAAD444ADEFBF4AF88324F15846ED555A7200C775A545CFA0
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06ABAD3B
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: 93ed2a13f528a8cc7f1b51e3ba29ba9915b76c7cfb9857377b203370412a5647
                                                                                • Instruction ID: 1b5e07595574d2c4232fd903145a17b3de4b529ae917e75fa8894d997a02e223
                                                                                • Opcode Fuzzy Hash: 93ed2a13f528a8cc7f1b51e3ba29ba9915b76c7cfb9857377b203370412a5647
                                                                                • Instruction Fuzzy Hash: 171102B59006899FCB10DF99D884BDEBFF4EB48324F15841AE568A7210C735A544CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06ABAD3B
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: cb2e31d821fbca0c15223348a7e54774c0e269882b60d11db4a4ea3c346b3171
                                                                                • Instruction ID: 1503f3fbcd28a619bcd276c750c009ff9ab54c63c0c9d30b3e815bd875e821a6
                                                                                • Opcode Fuzzy Hash: cb2e31d821fbca0c15223348a7e54774c0e269882b60d11db4a4ea3c346b3171
                                                                                • Instruction Fuzzy Hash: 8B11E3B59006499FCB10DF9AD884BDEBBF8FB48324F148419E529A7250C775A544CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 027E9916
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358752690.00000000027E0000.00000040.00000001.sdmp, Offset: 027E0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 9fb46756ac4e993de6ac20e1c282f3b31962e542fd34edd18347296165be2435
                                                                                • Instruction ID: ec1961a85b9d26b06fade68b3f540da34635ab1d3ce231500751f5db1e7bd23b
                                                                                • Opcode Fuzzy Hash: 9fb46756ac4e993de6ac20e1c282f3b31962e542fd34edd18347296165be2435
                                                                                • Instruction Fuzzy Hash: 56110FB2D006498FCB10CF9AD444ADEFBF4EF88224F15846AD429B7210D378A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • FindCloseChangeNotification.KERNELBASE(?), ref: 06ABC810
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ChangeCloseFindNotification
                                                                                • String ID:
                                                                                • API String ID: 2591292051-0
                                                                                • Opcode ID: ac1b8cb8c74f95596c97b85a91620a9bc83ee9a3a59d9238cc0f9c56a6fe1d5f
                                                                                • Instruction ID: d3c64494f395b91f9ee3222bbc13d822a1706f05cac2199f5f9214904f4cd209
                                                                                • Opcode Fuzzy Hash: ac1b8cb8c74f95596c97b85a91620a9bc83ee9a3a59d9238cc0f9c56a6fe1d5f
                                                                                • Instruction Fuzzy Hash: CE11FEB18006498FCB20DF99C488BDEBBF8EB48324F15842AD959A7240D738A944DFA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • PostMessageW.USER32(?,?,?,?), ref: 06ABB7D5
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: d13493d8f6e781b7a4263bf376045a8a8d316ddef75a6133ad55855d330be29b
                                                                                • Instruction ID: 8e07867f11dc76dc0f2ea39d147a9198f6913becea78b29872a7233411b4e7d8
                                                                                • Opcode Fuzzy Hash: d13493d8f6e781b7a4263bf376045a8a8d316ddef75a6133ad55855d330be29b
                                                                                • Instruction Fuzzy Hash: E911E2B58003499FDB10DF99D884BDEBBF8EB48324F14841AE554B7710C774A984CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: 28ac5a79cea67d1d8436d9948070539053040dbc34e4591e4b2a422083e1e4b0
                                                                                • Instruction ID: 5dcb67cd17f81903401b41bf9b794f8a27eba6d40d3b97c2a2111563213aa788
                                                                                • Opcode Fuzzy Hash: 28ac5a79cea67d1d8436d9948070539053040dbc34e4591e4b2a422083e1e4b0
                                                                                • Instruction Fuzzy Hash: 2B1100B5C002598FCB10DF99D588BDEBBF4AF48324F24891AD528B7390D774A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.368825334.0000000006AB0000.00000040.00000001.sdmp, Offset: 06AB0000, based on PE: false
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: c8b05660a27325e53bf6e77a5eb58239d5a38d57cde6cea5c7006f521d55eea6
                                                                                • Instruction ID: 52b3190df6733f2fda8e6407bf3d5fe9d7eae0a10ebe7d00f72593842d280da0
                                                                                • Opcode Fuzzy Hash: c8b05660a27325e53bf6e77a5eb58239d5a38d57cde6cea5c7006f521d55eea6
                                                                                • Instruction Fuzzy Hash: 221112B18002588FCB10DF9AD488BDEBBF8EF49324F10841AD518B7350D774A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358455639.000000000270D000.00000040.00000001.sdmp, Offset: 0270D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 085a5f18ecd4a975a0e2c237207f7bbcc04c147d373dbc169d61762073e30271
                                                                                • Instruction ID: 27eef3d4cf3ea24cebdda47add2488d4e494e49d56468534b5c8fb7f904474f9
                                                                                • Opcode Fuzzy Hash: 085a5f18ecd4a975a0e2c237207f7bbcc04c147d373dbc169d61762073e30271
                                                                                • Instruction Fuzzy Hash: D8214BB1504384DFDF15DF94D8C0B1ABFE1FB88314F248669E9495B286C336D819CB61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358455639.000000000270D000.00000040.00000001.sdmp, Offset: 0270D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a7efb886d553a15c54b52997305eec568c17d604cae3a5f899cc4ca9e640fab3
                                                                                • Instruction ID: 6cc9d203eb2a0e9d6c4a2e62739817082cf23a7d6d4053e66680077f6087dee1
                                                                                • Opcode Fuzzy Hash: a7efb886d553a15c54b52997305eec568c17d604cae3a5f899cc4ca9e640fab3
                                                                                • Instruction Fuzzy Hash: FA2103B1504344DFDB25DF54D8C0B2ABFA5FB88328F248669ED055B286C336D84ACBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358520993.000000000271D000.00000040.00000001.sdmp, Offset: 0271D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 83cf9bb95c76137a31b1a2d6622af585b30b35db7926d7d6a2a8efea28294de6
                                                                                • Instruction ID: 2a0a168f564a670a7a74278a6cb39ef7fcc000f0b4471b29ee675ea2db01c64e
                                                                                • Opcode Fuzzy Hash: 83cf9bb95c76137a31b1a2d6622af585b30b35db7926d7d6a2a8efea28294de6
                                                                                • Instruction Fuzzy Hash: F72107B1504244EFDB29DF18D5C0B2ABBA5FF88314F24C669E9495B246C336D846CF61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358520993.000000000271D000.00000040.00000001.sdmp, Offset: 0271D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9f1f4005a6631c1517a51c4d9771c91cdbd2978f6777acbe437af469f8893874
                                                                                • Instruction ID: 7c3f9ab6bf96ed2e920b0c205048bb1d680f0e34a2ec9d25a857a9166aff63d3
                                                                                • Opcode Fuzzy Hash: 9f1f4005a6631c1517a51c4d9771c91cdbd2978f6777acbe437af469f8893874
                                                                                • Instruction Fuzzy Hash: 832134B5604244EFDB24CF18D8C0B2ABB61FF88314F24C669E80A5B246C33AD847CF61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358520993.000000000271D000.00000040.00000001.sdmp, Offset: 0271D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7f11805e98ac1016d0b2213bda5fd73079cc1eaa8a0bb91f6468344aca37393e
                                                                                • Instruction ID: 7ba665f5c9c5d3afc1f801a9986b1b80c665c9a8a76110778a3afe632a77c85a
                                                                                • Opcode Fuzzy Hash: 7f11805e98ac1016d0b2213bda5fd73079cc1eaa8a0bb91f6468344aca37393e
                                                                                • Instruction Fuzzy Hash: DC219F755093C08FCB12CF24D990B15BF71EF46214F28C5DAD8498B6A7C33AD84ACB62
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358455639.000000000270D000.00000040.00000001.sdmp, Offset: 0270D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0e779bc96cab2d8d73c24b4a33a3293bac89d4ae5bf4cbc84fe8beb9762f18bd
                                                                                • Instruction ID: 3ee4d95985358f3ea398cb1e8175b1ef99a0a63e24d89cf8e7c7d2ff9c6a393d
                                                                                • Opcode Fuzzy Hash: 0e779bc96cab2d8d73c24b4a33a3293bac89d4ae5bf4cbc84fe8beb9762f18bd
                                                                                • Instruction Fuzzy Hash: 4921C076404280DFCF16CF40D9C0B16BFB1FB88314F2882A9D9480A256C33AE41ACB91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358455639.000000000270D000.00000040.00000001.sdmp, Offset: 0270D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                                • Instruction ID: fe2207355b2489d07ae5b5c3f69c76ac3b27e46e3388eba8eccb544e1a34c9d5
                                                                                • Opcode Fuzzy Hash: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                                • Instruction Fuzzy Hash: 3111B176904280CFCB11CF54D5C4B1ABFB1FB88324F24C6A9DC450B656C33AD45ACBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358520993.000000000271D000.00000040.00000001.sdmp, Offset: 0271D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9d35afff73f64a3ce4a9ad24b32e567c7a1d94a238c24113185269c1f0cd325c
                                                                                • Instruction ID: fc37d5a6d0233e691f9f1a71772724bc4c512e2691c50746ddbea26f73f7ce76
                                                                                • Opcode Fuzzy Hash: 9d35afff73f64a3ce4a9ad24b32e567c7a1d94a238c24113185269c1f0cd325c
                                                                                • Instruction Fuzzy Hash: F4118B75904284DFDB15CF14D5C4B16BBB1FF84224F28C6A9D8494B656C33AD44ACF61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358455639.000000000270D000.00000040.00000001.sdmp, Offset: 0270D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2b2b2c866c0db7ab41cff792cfc31730f6d37c80f994b0d4629abcbd93f8caa5
                                                                                • Instruction ID: b329211c18012af363ebc0ebe09480d370f897117af555f960fd58fb1633fec2
                                                                                • Opcode Fuzzy Hash: 2b2b2c866c0db7ab41cff792cfc31730f6d37c80f994b0d4629abcbd93f8caa5
                                                                                • Instruction Fuzzy Hash: E101F771408384DAE7204A51CCC5B6ABBD8EF40A28F08C41AEE046B2C6D378A848C6B1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000012.00000002.358455639.000000000270D000.00000040.00000001.sdmp, Offset: 0270D000, based on PE: false
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d63c5efae2d09c1b377de94d04880adb9d6b2aec19a7120e168ecf64cbcad5eb
                                                                                • Instruction ID: c497b9e00d045e4059e91d33c05c1b184ed384acfd6f3a29b3f3551cb9120c89
                                                                                • Opcode Fuzzy Hash: d63c5efae2d09c1b377de94d04880adb9d6b2aec19a7120e168ecf64cbcad5eb
                                                                                • Instruction Fuzzy Hash: BAF096714043849FEB218A15DCC5B66FFD8EF81B38F18C45AED085B2C6D3789848CAB1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Non-executed Functions