Loading ...

Play interactive tourEdit tour

Analysis Report MT 103.exe

Overview

General Information

Sample Name:MT 103.exe
Analysis ID:345017
MD5:4672f4c82e362f8fa602a273b82b2d2c
SHA1:870e7f55eeb4caf63422e8260e25bbda34cbb4d5
SHA256:c964743f18f47032f7b0cbfa7467b310927bb44813bd7861d4c85d55d6f34590
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • MT 103.exe (PID: 6452 cmdline: 'C:\Users\user\Desktop\MT 103.exe' MD5: 4672F4C82E362F8FA602A273B82B2D2C)
    • MT 103.exe (PID: 6524 cmdline: C:\Users\user\Desktop\MT 103.exe MD5: 4672F4C82E362F8FA602A273B82B2D2C)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "FDyIk99O", "URL: ": "https://RUj6sv9z4cuyCVePS.org", "To: ": "shakazoro@vivaldi.net", "ByHost: ": "smtp.vivaldi.net:587", "Password: ": "1CFmnRUIaFbHY", "From: ": "shakazoro@vivaldi.net"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000001.00000002.618540994.0000000002C12000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.MT 103.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: MT 103.exe.6524.1.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "FDyIk99O", "URL: ": "https://RUj6sv9z4cuyCVePS.org", "To: ": "shakazoro@vivaldi.net", "ByHost: ": "smtp.vivaldi.net:587", "Password: ": "1CFmnRUIaFbHY", "From: ": "shakazoro@vivaldi.net"}
              Multi AV Scanner detection for submitted fileShow sources
              Source: MT 103.exeReversingLabs: Detection: 15%
              Machine Learning detection for sampleShow sources
              Source: MT 103.exeJoe Sandbox ML: detected
              Source: 1.2.MT 103.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

              Compliance:

              barindex
              Uses 32bit PE filesShow sources
              Source: MT 103.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
              Source: MT 103.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0626A780

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: https://RUj6sv9z4cuyCVePS.org
              Source: global trafficTCP traffic: 192.168.2.5:49749 -> 31.209.137.12:587
              Source: Joe Sandbox ViewIP Address: 31.209.137.12 31.209.137.12
              Source: global trafficTCP traffic: 192.168.2.5:49749 -> 31.209.137.12:587
              Source: unknownDNS traffic detected: queries for: smtp.vivaldi.net
              Source: MT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: MT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: MT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://HGYsjc.com
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpString found in binary or memory: http://cps.letsencrypt.org0
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpString found in binary or memory: http://r3.i.lencr.org/0
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpString found in binary or memory: http://r3.o.lencr.org0
              Source: MT 103.exe, 00000000.00000002.248507355.0000000002EF1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: MT 103.exe, 00000001.00000002.618858084.0000000002C72000.00000004.00000001.sdmpString found in binary or memory: http://smtp.vivaldi.net
              Source: MT 103.exeString found in binary or memory: http://thesnake.herokuapp.com/snakes
              Source: MT 103.exe, 00000001.00000002.618540994.0000000002C12000.00000004.00000001.sdmpString found in binary or memory: https://RUj6sv9z4cuyCVePS.org
              Source: MT 103.exe, 00000000.00000002.249712252.0000000003EF9000.00000004.00000001.sdmp, MT 103.exe, 00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: MT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

              System Summary:

              barindex
              .NET source code contains very large array initializationsShow sources
              Source: 1.2.MT 103.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bD09A82CFu002dE41Fu002d44D6u002d9453u002d358E59BDDC15u007d/E545F48Du002d159Fu002d4682u002dB3A7u002d982DC82EB5E9.csLarge array initialization: .cctor: array initializer size 11939
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_02EBC5080_2_02EBC508
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_02EB99900_2_02EB9990
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_0626AF800_2_0626AF80
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_062660580_2_06266058
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010584001_2_01058400
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010500401_2_01050040
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010533C11_2_010533C1
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010526081_2_01052608
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010599001_2_01059900
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_0105EDC81_2_0105EDC8
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010598501_2_01059850
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_01062D501_2_01062D50
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010620201_2_01062020
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_0106E0C01_2_0106E0C0
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_0106BF581_2_0106BF58
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_0106AB701_2_0106AB70
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_010626181_2_01062618
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_01069DB81_2_01069DB8
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D46A01_2_050D46A0
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D35C41_2_050D35C4
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D3D501_2_050D3D50
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050DDA101_2_050DDA10
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D46301_2_050D4630
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D46901_2_050D4690
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D35B81_2_050D35B8
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_050D53931_2_050D5393
              Source: MT 103.exeBinary or memory string: OriginalFilename vs MT 103.exe
              Source: MT 103.exe, 00000000.00000000.242100872.0000000000A72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameRestrictedErrorObject.exe2 vs MT 103.exe
              Source: MT 103.exe, 00000000.00000002.253587991.00000000061D0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs MT 103.exe
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs MT 103.exe
              Source: MT 103.exe, 00000000.00000002.248507355.0000000002EF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMbUGqFFoWcXbQVSprfqpYEIMoykwB.exe4 vs MT 103.exe
              Source: MT 103.exeBinary or memory string: OriginalFilename vs MT 103.exe
              Source: MT 103.exe, 00000001.00000002.617959918.0000000001200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs MT 103.exe
              Source: MT 103.exe, 00000001.00000002.616333882.00000000008E2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameRestrictedErrorObject.exe2 vs MT 103.exe
              Source: MT 103.exe, 00000001.00000002.622690326.0000000006340000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs MT 103.exe
              Source: MT 103.exe, 00000001.00000002.616537778.0000000000D38000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs MT 103.exe
              Source: MT 103.exe, 00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameMbUGqFFoWcXbQVSprfqpYEIMoykwB.exe4 vs MT 103.exe
              Source: MT 103.exeBinary or memory string: OriginalFilenameRestrictedErrorObject.exe2 vs MT 103.exe
              Source: MT 103.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: MT 103.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: 1.2.MT 103.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 1.2.MT 103.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
              Source: C:\Users\user\Desktop\MT 103.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MT 103.exe.logJump to behavior
              Source: MT 103.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\MT 103.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MT 103.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\MT 103.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: MT 103.exeReversingLabs: Detection: 15%
              Source: unknownProcess created: C:\Users\user\Desktop\MT 103.exe 'C:\Users\user\Desktop\MT 103.exe'
              Source: unknownProcess created: C:\Users\user\Desktop\MT 103.exe C:\Users\user\Desktop\MT 103.exe
              Source: C:\Users\user\Desktop\MT 103.exeProcess created: C:\Users\user\Desktop\MT 103.exe C:\Users\user\Desktop\MT 103.exeJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: MT 103.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: MT 103.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_06263C19 push ss; retf 0_2_06263C1A
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_06260006 push es; retf 0_2_0626001C
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 0_2_062619BB push B8FFFFEDh; ret 0_2_062619C0
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_01067A37 push edi; retn 0000h1_2_01067A39
              Source: initial sampleStatic PE information: section name: .text entropy: 7.5797406422
              Source: C:\Users\user\Desktop\MT 103.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.248507355.0000000002EF1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MT 103.exe PID: 6452, type: MEMORY
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Users\user\Desktop\MT 103.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Users\user\Desktop\MT 103.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\MT 103.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeWindow / User API: threadDelayed 4278Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeWindow / User API: threadDelayed 5477Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exe TID: 6456Thread sleep time: -53954s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exe TID: 6496Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exe TID: 6924Thread sleep time: -23058430092136925s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exe TID: 6928Thread sleep count: 4278 > 30Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exe TID: 6928Thread sleep count: 5477 > 30Jump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MT 103.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllY-
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: MT 103.exe, 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\MT 103.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeCode function: 1_2_01050040 LdrInitializeThunk,1_2_01050040
              Source: C:\Users\user\Desktop\MT 103.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\MT 103.exeMemory written: C:\Users\user\Desktop\MT 103.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeProcess created: C:\Users\user\Desktop\MT 103.exe C:\Users\user\Desktop\MT 103.exeJump to behavior
              Source: MT 103.exe, 00000001.00000002.618275722.0000000001640000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: MT 103.exe, 00000001.00000002.618275722.0000000001640000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: MT 103.exe, 00000001.00000002.618275722.0000000001640000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
              Source: MT 103.exe, 00000001.00000002.618275722.0000000001640000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
              Source: MT 103.exe, 00000001.00000002.618275722.0000000001640000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Users\user\Desktop\MT 103.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Users\user\Desktop\MT 103.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.618540994.0000000002C12000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.618470302.0000000002BE5000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.249712252.0000000003EF9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MT 103.exe PID: 6452, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MT 103.exe PID: 6524, type: MEMORY
              Source: Yara matchFile source: 1.2.MT 103.exe.400000.0.unpack, type: UNPACKEDPE
              Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\MT 103.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\MT 103.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Yara matchFile source: 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MT 103.exe PID: 6524, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.618540994.0000000002C12000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.618470302.0000000002BE5000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.249712252.0000000003EF9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MT 103.exe PID: 6452, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MT 103.exe PID: 6524, type: MEMORY
              Source: Yara matchFile source: 1.2.MT 103.exe.400000.0.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion13Credentials in Registry1Security Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion13SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol111SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              MT 103.exe15%ReversingLabsWin32.Trojan.Generic
              MT 103.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              1.2.MT 103.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              https://RUj6sv9z4cuyCVePS.org0%Avira URL Cloudsafe
              http://cps.letsencrypt.org00%URL Reputationsafe
              http://cps.letsencrypt.org00%URL Reputationsafe
              http://cps.letsencrypt.org00%URL Reputationsafe
              http://cps.letsencrypt.org00%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              http://HGYsjc.com0%Avira URL Cloudsafe
              http://r3.o.lencr.org00%URL Reputationsafe
              http://r3.o.lencr.org00%URL Reputationsafe
              http://r3.o.lencr.org00%URL Reputationsafe
              http://r3.o.lencr.org00%URL Reputationsafe
              http://thesnake.herokuapp.com/snakes0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
              http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
              http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
              http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
              http://r3.i.lencr.org/00%URL Reputationsafe
              http://r3.i.lencr.org/00%URL Reputationsafe
              http://r3.i.lencr.org/00%URL Reputationsafe
              http://r3.i.lencr.org/00%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              smtp.vivaldi.net
              31.209.137.12
              truefalse
                high

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                https://RUj6sv9z4cuyCVePS.orgtrue
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1MT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSMT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://cps.letsencrypt.org0MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://HGYsjc.comMT 103.exe, 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://r3.o.lencr.org0MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://smtp.vivaldi.netMT 103.exe, 00000001.00000002.618858084.0000000002C72000.00000004.00000001.sdmpfalse
                  high
                  http://thesnake.herokuapp.com/snakesMT 103.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMT 103.exe, 00000000.00000002.248507355.0000000002EF1000.00000004.00000001.sdmpfalse
                    high
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipMT 103.exe, 00000000.00000002.249712252.0000000003EF9000.00000004.00000001.sdmp, MT 103.exe, 00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://cps.root-x1.letsencrypt.org0MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://r3.i.lencr.org/0MT 103.exe, 00000001.00000002.617564319.0000000000F87000.00000004.00000020.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    31.209.137.12
                    unknownIceland
                    51896HRINGDU-ASISfalse

                    General Information

                    Joe Sandbox Version:31.0.0 Emerald
                    Analysis ID:345017
                    Start date:27.01.2021
                    Start time:15:55:34
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 9m 26s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:MT 103.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:34
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 93
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .exe
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.255.188.83, 104.42.151.234, 23.210.248.85, 51.104.144.132, 95.101.22.216, 95.101.22.224, 95.101.27.142, 95.101.27.163, 8.241.9.254, 8.248.133.254, 8.253.204.249, 8.241.9.126, 67.27.159.126, 51.103.5.159, 52.155.217.156, 20.54.26.129, 51.11.168.160
                    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    15:56:33API Interceptor1131x Sleep call for process: MT 103.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    31.209.137.12________.exeGet hashmaliciousBrowse
                      PO-KMML17-01-2021-ATV-image.png.zip.exeGet hashmaliciousBrowse
                        PO-KMML-17-01-2021-ATV-image.png.zip.exeGet hashmaliciousBrowse
                          PO-JAN16-2021.ASW.image.jpeg.eml.png.exeGet hashmaliciousBrowse
                            SwiftRef_INV0880021122020.exeGet hashmaliciousBrowse
                              ________.exeGet hashmaliciousBrowse
                                DINTEC order list.exeGet hashmaliciousBrowse
                                  30714756.PDF.exeGet hashmaliciousBrowse
                                    30714756.exeGet hashmaliciousBrowse
                                      file.exeGet hashmaliciousBrowse
                                        file.exeGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            jK49h2Aa3n.exeGet hashmaliciousBrowse
                                              RFQ.01-12-2021.eml.exeGet hashmaliciousBrowse
                                                Scan003.pdf.exeGet hashmaliciousBrowse
                                                  21122020_001.exeGet hashmaliciousBrowse
                                                    Invoice 277.exeGet hashmaliciousBrowse
                                                      Shipment Details.Pdf.exeGet hashmaliciousBrowse
                                                        CIYH2001.pdf.exeGet hashmaliciousBrowse
                                                          Order Inquiry.Jpeg.exeGet hashmaliciousBrowse

                                                            Domains

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            smtp.vivaldi.net________.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            PO-KMML17-01-2021-ATV-image.png.zip.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            PO-KMML-17-01-2021-ATV-image.png.zip.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            PO-JAN16-2021.ASW.image.jpeg.eml.png.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            SwiftRef_INV0880021122020.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            ________.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            DINTEC order list.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            30714756.PDF.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            30714756.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            file.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            file.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            file.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            jK49h2Aa3n.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            RFQ.01-12-2021.eml.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Scan003.pdf.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            21122020_001.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Invoice 277.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Shipment Details.Pdf.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            CIYH2001.pdf.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Order Inquiry.Jpeg.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12

                                                            ASN

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            HRINGDU-ASISVivaldi.3.5.2115.87.x64.exeGet hashmaliciousBrowse
                                                            • 31.209.137.5
                                                            ________.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            PO-KMML17-01-2021-ATV-image.png.zip.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            PO-KMML-17-01-2021-ATV-image.png.zip.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            PO-JAN16-2021.ASW.image.jpeg.eml.png.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            SwiftRef_INV0880021122020.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            ________.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            DINTEC order list.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            30714756.PDF.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            30714756.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            file.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            file.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            file.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            jK49h2Aa3n.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            RFQ.01-12-2021.eml.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Scan003.pdf.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            21122020_001.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Invoice 277.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            Shipment Details.Pdf.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12
                                                            CIYH2001.pdf.exeGet hashmaliciousBrowse
                                                            • 31.209.137.12

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MT 103.exe.log
                                                            Process:C:\Users\user\Desktop\MT 103.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1314
                                                            Entropy (8bit):5.350128552078965
                                                            Encrypted:false
                                                            SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                            MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                            SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                            SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                            SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.569888038395144
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:MT 103.exe
                                                            File size:630272
                                                            MD5:4672f4c82e362f8fa602a273b82b2d2c
                                                            SHA1:870e7f55eeb4caf63422e8260e25bbda34cbb4d5
                                                            SHA256:c964743f18f47032f7b0cbfa7467b310927bb44813bd7861d4c85d55d6f34590
                                                            SHA512:14444e0a52543742f683b0f139d6a1fbbafdbc301275383ffe8b2976e16a0ecf6be25db58e331fac20685de991e40b8dca59eb04ca859b6fbdfc3b6fcb8e0f18
                                                            SSDEEP:12288:UlrkyMXW2j4eRtpfQC2fvNvHjJGa1UlxzEXIG9DRYn:UlwjAvFH8xbQXLYn
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Lq.`..............P.............V.... ........@.. ....................................@................................

                                                            File Icon

                                                            Icon Hash:00828e8e8686b000

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x49b356
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x6011714C [Wed Jan 27 13:57:32 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:v4.0.30319
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                            Entrypoint Preview

                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x9b3040x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000x5dc.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x9e0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x9935c0x99400False0.790695414458data7.5797406422IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x9c0000x5dc0x600False0.427734375data4.15501859449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x9e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_VERSION0x9c0900x34cdata
                                                            RT_MANIFEST0x9c3ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                            Imports

                                                            DLLImport
                                                            mscoree.dll_CorExeMain

                                                            Version Infos

                                                            DescriptionData
                                                            Translation0x0000 0x04b0
                                                            LegalCopyrightCopyright 2018
                                                            Assembly Version1.0.0.0
                                                            InternalNameRestrictedErrorObject.exe
                                                            FileVersion1.0.0.0
                                                            CompanyName
                                                            LegalTrademarks
                                                            Comments
                                                            ProductNameRevision
                                                            ProductVersion1.0.0.0
                                                            FileDescriptionRevision
                                                            OriginalFilenameRestrictedErrorObject.exe

                                                            Network Behavior

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 27, 2021 15:58:07.079046965 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.161716938 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.161848068 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.642831087 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.643309116 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.727960110 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.728022099 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.728478909 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.814469099 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.861269951 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.870682955 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.955635071 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.955660105 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.955668926 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:07.955841064 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:07.962594032 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.047523022 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.095602036 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.132920980 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.215461016 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.217914104 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.303095102 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.304089069 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.428047895 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.489077091 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.490253925 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.577325106 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.580863953 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.581585884 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.701534986 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.702164888 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.786614895 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.792118073 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.792442083 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.793147087 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.793267965 CET49749587192.168.2.531.209.137.12
                                                            Jan 27, 2021 15:58:08.875999928 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.876442909 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.876451969 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.892770052 CET5874974931.209.137.12192.168.2.5
                                                            Jan 27, 2021 15:58:08.939368963 CET49749587192.168.2.531.209.137.12

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 27, 2021 15:56:26.373944998 CET6529653192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:26.424725056 CET53652968.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:27.420595884 CET6318353192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:27.468648911 CET53631838.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:29.202940941 CET6015153192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:29.250948906 CET53601518.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:31.049668074 CET5696953192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:31.097757101 CET53569698.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:31.867089987 CET5516153192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:31.920504093 CET53551618.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:33.100469112 CET5475753192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:33.156724930 CET53547578.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:42.751538992 CET4999253192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:42.812489033 CET53499928.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:56:55.667288065 CET6007553192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:56:55.717937946 CET53600758.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:00.229284048 CET5501653192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:00.287761927 CET53550168.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:14.984648943 CET6434553192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:15.042973042 CET53643458.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:15.141880035 CET5712853192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:15.189727068 CET53571288.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:15.434649944 CET5479153192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:15.516995907 CET53547918.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:17.759613037 CET5046353192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:17.810312986 CET53504638.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:20.427763939 CET5039453192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:20.485363960 CET53503948.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:28.116421938 CET5853053192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:28.175647974 CET53585308.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:43.850028038 CET5381353192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:43.912199974 CET53538138.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:45.455710888 CET6373253192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:45.513135910 CET53637328.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:46.172065973 CET5734453192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:46.231161118 CET53573448.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:46.699399948 CET5445053192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:46.767466068 CET53544508.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:46.896500111 CET5926153192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:46.957297087 CET53592618.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:47.245702028 CET5715153192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:47.346760988 CET53571518.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:48.303390980 CET5941353192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:48.361988068 CET53594138.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:49.355200052 CET6051653192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:49.411828995 CET53605168.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:51.138535023 CET5164953192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:51.196787119 CET53516498.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:52.242624998 CET6508653192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:52.299139023 CET53650868.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:57:54.782999992 CET5643253192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:57:54.830873966 CET53564328.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:58:01.879125118 CET5292953192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:58:01.929246902 CET53529298.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:58:03.784403086 CET6431753192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:58:03.864379883 CET53643178.8.8.8192.168.2.5
                                                            Jan 27, 2021 15:58:07.000411987 CET6100453192.168.2.58.8.8.8
                                                            Jan 27, 2021 15:58:07.060689926 CET53610048.8.8.8192.168.2.5

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Jan 27, 2021 15:58:07.000411987 CET192.168.2.58.8.8.80xde90Standard query (0)smtp.vivaldi.netA (IP address)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Jan 27, 2021 15:58:07.060689926 CET8.8.8.8192.168.2.50xde90No error (0)smtp.vivaldi.net31.209.137.12A (IP address)IN (0x0001)

                                                            SMTP Packets

                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Jan 27, 2021 15:58:07.642831087 CET5874974931.209.137.12192.168.2.5220 smtp.vivaldi.net ESMTP Postfix (Ubuntu)
                                                            Jan 27, 2021 15:58:07.643309116 CET49749587192.168.2.531.209.137.12EHLO 992547
                                                            Jan 27, 2021 15:58:07.728022099 CET5874974931.209.137.12192.168.2.5250-smtp.vivaldi.net
                                                            250-PIPELINING
                                                            250-SIZE 36700160
                                                            250-ETRN
                                                            250-STARTTLS
                                                            250-ENHANCEDSTATUSCODES
                                                            250-8BITMIME
                                                            250-DSN
                                                            250 SMTPUTF8
                                                            Jan 27, 2021 15:58:07.728478909 CET49749587192.168.2.531.209.137.12STARTTLS
                                                            Jan 27, 2021 15:58:07.814469099 CET5874974931.209.137.12192.168.2.5220 2.0.0 Ready to start TLS

                                                            Code Manipulations

                                                            Statistics

                                                            CPU Usage

                                                            Click to jump to process

                                                            Memory Usage

                                                            Click to jump to process

                                                            High Level Behavior Distribution

                                                            Click to dive into process behavior distribution

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:15:56:31
                                                            Start date:27/01/2021
                                                            Path:C:\Users\user\Desktop\MT 103.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\MT 103.exe'
                                                            Imagebase:0xa70000
                                                            File size:630272 bytes
                                                            MD5 hash:4672F4C82E362F8FA602A273B82B2D2C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.248576551.0000000002F22000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.248507355.0000000002EF1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.249712252.0000000003EF9000.00000004.00000001.sdmp, Author: Joe Security
                                                            Reputation:low

                                                            General

                                                            Start time:15:56:33
                                                            Start date:27/01/2021
                                                            Path:C:\Users\user\Desktop\MT 103.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\MT 103.exe
                                                            Imagebase:0x8e0000
                                                            File size:630272 bytes
                                                            MD5 hash:4672F4C82E362F8FA602A273B82B2D2C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.618421104.0000000002BB1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.618540994.0000000002C12000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.616043319.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.618470302.0000000002BE5000.00000004.00000001.sdmp, Author: Joe Security
                                                            Reputation:low

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >

                                                              Executed Functions

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 315d4f135cf48d5b110d12191bee2264c8247617609cfb482936ad26b05e8b8d
                                                              • Instruction ID: 29e91399d9133733a452d84034a8f32cd65847bf44976b8665a63650147c55b0
                                                              • Opcode Fuzzy Hash: 315d4f135cf48d5b110d12191bee2264c8247617609cfb482936ad26b05e8b8d
                                                              • Instruction Fuzzy Hash: CB22AA30B112059FDB99DB7AC490BAEB7F6AF89701F148069E906DB3A1CB35EC41CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d052904d0a01e1b240d6f38394a18b1afbd2ecc83bb8ebd1d66e8d2094fbb60b
                                                              • Instruction ID: 2671585fb4b7351d6ba869801c3f80af8c191ee5030b4994b4f76635964f67ab
                                                              • Opcode Fuzzy Hash: d052904d0a01e1b240d6f38394a18b1afbd2ecc83bb8ebd1d66e8d2094fbb60b
                                                              • Instruction Fuzzy Hash: 45911670D2421D9FDB40DFEAD884A9DBBF2BB49304F248129E809A7345E7749985CF92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc76e1a71e1ff531ce74e9f9187d0c9a4b3c709b91892b282ba3db65200d6a15
                                                              • Instruction ID: 6868f72d8f8d3f05d4d7466cbf353f87eacb2afbbfad0116a5d1e58c8057d128
                                                              • Opcode Fuzzy Hash: bc76e1a71e1ff531ce74e9f9187d0c9a4b3c709b91892b282ba3db65200d6a15
                                                              • Instruction Fuzzy Hash: 29117C70D142598FDB15CFA6C4087EEFBF1AB4E301F149069E805B7294C7788A84CBA8
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06268236
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: c71bc782cd926b15bfcaa65b187e6272c169727c472b6775818c3de0a7a0cb23
                                                              • Instruction ID: fc7ac396a02a30a8d91c7acc3f529c65c08a6a69419dc65fe9a8b4c4ead2c6e4
                                                              • Opcode Fuzzy Hash: c71bc782cd926b15bfcaa65b187e6272c169727c472b6775818c3de0a7a0cb23
                                                              • Instruction Fuzzy Hash: 69917C71D10219CFDB50CF69C8857EEBBB2BF48314F0485A9E859A7280DB789985CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02EBBE0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 3f186fbdf9786df4cef3794091f2394ccd690d0e0cd0bfb671926e7a22e14382
                                                              • Instruction ID: a89d560c0b2d4c8ccc62129c2013ae2c5ac76837ac8108a966beb6655324212d
                                                              • Opcode Fuzzy Hash: 3f186fbdf9786df4cef3794091f2394ccd690d0e0cd0bfb671926e7a22e14382
                                                              • Instruction Fuzzy Hash: 58712470A00B058FD725CF2AD44579BB7F1FF88208F008A2DD99AD7A50DB75E8468F91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EBDD8A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 8aa5ae5317f8959d6f16951939219885f207c237569605fdbafa2d523755f890
                                                              • Instruction ID: 3150febc9733b8e9c3bdb8afadfa6db933a82cf9b6c3c4fac3763eeefc1cff65
                                                              • Opcode Fuzzy Hash: 8aa5ae5317f8959d6f16951939219885f207c237569605fdbafa2d523755f890
                                                              • Instruction Fuzzy Hash: A26112B1C00249AFDF12CFA9C984ACEBFB1FF49314F15816AE819AB221D3749949CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EBDD8A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 46202621e36a7251145ab30675a483040754873011bc81b134a274cf6fc1f4e0
                                                              • Instruction ID: 443166c698f28c8decfe30d29ceefe6e9c999cc4ae017b9a301375313b52313b
                                                              • Opcode Fuzzy Hash: 46202621e36a7251145ab30675a483040754873011bc81b134a274cf6fc1f4e0
                                                              • Instruction Fuzzy Hash: 0651D1B1D00309EFDB15CF99C884ADEBBB5BF49314F24862AE819AB250D7749885CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EB6E3F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 53408f9c740d3159237cee72c0e10a0aa78e2513096746818387f59e0e1894c1
                                                              • Instruction ID: 342063c48111025313927e7a11f5771e9b3c5f2ad4324632528d88c849f75633
                                                              • Opcode Fuzzy Hash: 53408f9c740d3159237cee72c0e10a0aa78e2513096746818387f59e0e1894c1
                                                              • Instruction Fuzzy Hash: F941567A900248AFCB01CF9AD844ADEBFF9FB48314F05802AE914A7261C334A955DFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06267E08
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: e577d26574e99fae7829112084c6156d28667ff30ee3ec0a43175301260088da
                                                              • Instruction ID: 40756ac1cf8081d875a1a81768bea8277640c50fa12bb260a1fe2bbf266e80e3
                                                              • Opcode Fuzzy Hash: e577d26574e99fae7829112084c6156d28667ff30ee3ec0a43175301260088da
                                                              • Instruction Fuzzy Hash: B8215771900309DFCB00CFAAC884BDEBBF5FF48314F008829E918A7240D778A994CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EB6E3F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 7f36ddf5bc4bf25106d81e6785e29d45ab6d4fec01e73ceb28c6fdc8977f2b05
                                                              • Instruction ID: 88627294789981a65a383076a8afeb909a9f40a4de3aa8d80a6ddade78f41062
                                                              • Opcode Fuzzy Hash: 7f36ddf5bc4bf25106d81e6785e29d45ab6d4fec01e73ceb28c6fdc8977f2b05
                                                              • Instruction Fuzzy Hash: B221E5B59012089FDB10CF99D584ADEBBF8EF58314F15841AE914A3350D374A954CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06267EE8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 518c0d4130db5fe671351b3154fa9d869e38937a80eab0b86efb2855fcc1bdf4
                                                              • Instruction ID: 10bee57e0b0f48f564aba38d432fedd57031966e257a88ae6de6111ac5e01ee0
                                                              • Opcode Fuzzy Hash: 518c0d4130db5fe671351b3154fa9d869e38937a80eab0b86efb2855fcc1bdf4
                                                              • Instruction Fuzzy Hash: F52128719003099FCB10DFAAD8847EEFBF5FF48314F558829E919A7240C738A954CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetThreadContext.KERNELBASE(?,00000000), ref: 06267C5E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: ContextThread
                                                              • String ID:
                                                              • API String ID: 1591575202-0
                                                              • Opcode ID: 9bf3b61cdc6b9c349c1aef7016802e7185aac25a961b4069925dab57f017024f
                                                              • Instruction ID: c6f6e2397d770fd876d9ebd50ba5ddc01ffc68b5335723c41cf62ff9c44e7b35
                                                              • Opcode Fuzzy Hash: 9bf3b61cdc6b9c349c1aef7016802e7185aac25a961b4069925dab57f017024f
                                                              • Instruction Fuzzy Hash: BA213A71D043098FDB50DFAAC4847EEBBF4EF48218F158429D519A7340CB78A985CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EB6E3F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 3e83ca87dec3aa87f17ae0b9ed3e8198b2196bd02cdb7378f14d10f975c374bf
                                                              • Instruction ID: 81091d1653c02c6180d6fb4d0151abcff0c2ed32747f59d5631aa5d4f2b98b9b
                                                              • Opcode Fuzzy Hash: 3e83ca87dec3aa87f17ae0b9ed3e8198b2196bd02cdb7378f14d10f975c374bf
                                                              • Instruction Fuzzy Hash: 7721C2B5901208AFDB10CFAAD984ADEBBF9EB48324F15841AE915A3350D374A954CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02EBBE89,00000800,00000000,00000000), ref: 02EBC09A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 5b523d18252cbd0b1b05117de0f6aa68df4db04f29d5682c090554e9c4f0ae06
                                                              • Instruction ID: c96e02b90351e36366dca4f7e9e44587f584c1955d00f3f7d53128e58f97a965
                                                              • Opcode Fuzzy Hash: 5b523d18252cbd0b1b05117de0f6aa68df4db04f29d5682c090554e9c4f0ae06
                                                              • Instruction Fuzzy Hash: B21114B69042089FDB10CF9AD448BDFFBF4EF88358F15942AD515A7200C375A945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06267D26
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: e13932cbd99a96ca424fed374d02430d24ccf0c4c0e3202a1b2bff536116ca7e
                                                              • Instruction ID: 733eece6d46a7f46d626320f21c597d4f6abbd79292a8ddcd345d750a5b3e21a
                                                              • Opcode Fuzzy Hash: e13932cbd99a96ca424fed374d02430d24ccf0c4c0e3202a1b2bff536116ca7e
                                                              • Instruction Fuzzy Hash: 201167729042099FCB10DFAAD8487EFBBF5AF48324F158819E525A7240C735A994CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02EBBE89,00000800,00000000,00000000), ref: 02EBC09A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 2f01c87bffc9bfb7d1d328924e71d5899ad0718f302c815c285f5c92285c3a8d
                                                              • Instruction ID: ef9b23a170ca3de90420f8daf6860d8d92fe13c9fad9fd628b78a57a195acf37
                                                              • Opcode Fuzzy Hash: 2f01c87bffc9bfb7d1d328924e71d5899ad0718f302c815c285f5c92285c3a8d
                                                              • Instruction Fuzzy Hash: EE1103B6900209CFDB11CF99C588BDEFBF4AF48318F15851AD525A7600C375A549CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 511aff1af4728c367417d0dc87eb13d1e9a84c22688f84cd04e8e02193d658d7
                                                              • Instruction ID: b3d01fac64da7aa2ceac22b10d5a6c0cefafd548371a32f0131c76f1174eaaca
                                                              • Opcode Fuzzy Hash: 511aff1af4728c367417d0dc87eb13d1e9a84c22688f84cd04e8e02193d658d7
                                                              • Instruction Fuzzy Hash: D01128719042498FDB10DFAAD4487DFFBF5AB88328F158819D525A7240C774A984CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02EBBE0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 665385063349ce96f9e3521d76cbff908483755b81e9e165c4a7a5f6bda69bec
                                                              • Instruction ID: 2ce83ed332d39597666693e6f5f4375343f4789a2b019e37dc1b0674ea330ac0
                                                              • Opcode Fuzzy Hash: 665385063349ce96f9e3521d76cbff908483755b81e9e165c4a7a5f6bda69bec
                                                              • Instruction Fuzzy Hash: 9611E3B5D006498FDB10CF9AD444BDFFBF4EF88228F15842AD969A7610C374A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0626A1BD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 80ed8ae7a3c50aaba53f9a1457a5f07a5bbb085b35c475ada83b8979c265c8a4
                                                              • Instruction ID: 4ce8e7e7f78720ad7074fefd4b9892f3a57b18f03113e58f78cfd4006eddd56b
                                                              • Opcode Fuzzy Hash: 80ed8ae7a3c50aaba53f9a1457a5f07a5bbb085b35c475ada83b8979c265c8a4
                                                              • Instruction Fuzzy Hash: 9C11E0B59103099FDB10DF9AD888BDEBBF8EB48324F10845AE915A7200C374A984CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 0626B8E8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.253695498.0000000006260000.00000040.00000001.sdmp, Offset: 06260000, based on PE: false
                                                              Similarity
                                                              • API ID: ChangeCloseFindNotification
                                                              • String ID:
                                                              • API String ID: 2591292051-0
                                                              • Opcode ID: 3189fc15461bbcda4b2f6acb80c829a9ad19c327cdfd5478ec0843c9416d9d3e
                                                              • Instruction ID: 011ae0fef6f77b157ac7d45e1beeab5daeb190b3a0717a64deecc1e155ea56c0
                                                              • Opcode Fuzzy Hash: 3189fc15461bbcda4b2f6acb80c829a9ad19c327cdfd5478ec0843c9416d9d3e
                                                              • Instruction Fuzzy Hash: 4E1106B58103098FDB10DF9AC449BDEBBF4EB48364F158429D965A7340D738A585CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetWindowLongW.USER32(?,?,?), ref: 02EBDF1D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: LongWindow
                                                              • String ID:
                                                              • API String ID: 1378638983-0
                                                              • Opcode ID: b0631b29f6a21d4846c78ef90107899ea3a57b907cf16167f32b9329be7c2d15
                                                              • Instruction ID: 2f60b236c6796300942b85b520a0743d4fd838cf202a48afc6f86438d355b0de
                                                              • Opcode Fuzzy Hash: b0631b29f6a21d4846c78ef90107899ea3a57b907cf16167f32b9329be7c2d15
                                                              • Instruction Fuzzy Hash: 931100B59002089FDB10CF9AD988BDFBBF8EB48324F11841AE915A3300C374A944CFA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetWindowLongW.USER32(?,?,?), ref: 02EBDF1D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID: LongWindow
                                                              • String ID:
                                                              • API String ID: 1378638983-0
                                                              • Opcode ID: 1ad471cf53ce7b1d5d8ee821fbf49797f4977e4253e2c25fb58ed3a22e00bf86
                                                              • Instruction ID: f0a7ad9b9745ae147f7eaf9045f37ca836b8533f4706bafbc1ae2c184bb39e9e
                                                              • Opcode Fuzzy Hash: 1ad471cf53ce7b1d5d8ee821fbf49797f4977e4253e2c25fb58ed3a22e00bf86
                                                              • Instruction Fuzzy Hash: B911F2B5900209DFDB10CF99D589BDEBBF8EB58324F15881AE919A3700C374AA44CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248251263.000000000140D000.00000040.00000001.sdmp, Offset: 0140D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d4ca56c345033cd6983c7b53061d4d52a18b2c129b624fd6380d2da6742b108
                                                              • Instruction ID: 7ddf6ddff1b74d457296879bebdb386580f076dcbcedb57b3bcebdc9a0942ba8
                                                              • Opcode Fuzzy Hash: 6d4ca56c345033cd6983c7b53061d4d52a18b2c129b624fd6380d2da6742b108
                                                              • Instruction Fuzzy Hash: 9421D871904240DFDB06DF94D9C4B17BB65FB84328F24857AED054B296C336D85AC7A2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248264701.000000000141D000.00000040.00000001.sdmp, Offset: 0141D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cd20bcb4a773764d059193b12019635fd67b41459f020310f79b52330ce2dd5a
                                                              • Instruction ID: 75eea7eff2a9802e3063cce093285cbd9ac773373b3fb95dc60731354167d6dc
                                                              • Opcode Fuzzy Hash: cd20bcb4a773764d059193b12019635fd67b41459f020310f79b52330ce2dd5a
                                                              • Instruction Fuzzy Hash: 972106F5904240DFCB15CF54D8C8B16BF65FB84258F24C96AD9094B35AC33AD847C761
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248264701.000000000141D000.00000040.00000001.sdmp, Offset: 0141D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53253d25943be94c531529f8cad26ca37c315de046b7bdbd95d6cb99b03c855b
                                                              • Instruction ID: 0078c0d9679399be76cb9fccb330ba99de023b42d73915a8f5ca69a33f12c01d
                                                              • Opcode Fuzzy Hash: 53253d25943be94c531529f8cad26ca37c315de046b7bdbd95d6cb99b03c855b
                                                              • Instruction Fuzzy Hash: EC2192B55093808FDB13CF24D594716BF71EB46214F28C5DBD8498B667C33A984ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248251263.000000000140D000.00000040.00000001.sdmp, Offset: 0140D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5a368cc5c02d0b3c716e3061d2d03e1c83b6206fc9b52232e2685b0d252f8fbb
                                                              • Instruction ID: dba3d658b51052e8256fd60bbb6e15dd797970d7eaa826357a01d6dd2de90cdf
                                                              • Opcode Fuzzy Hash: 5a368cc5c02d0b3c716e3061d2d03e1c83b6206fc9b52232e2685b0d252f8fbb
                                                              • Instruction Fuzzy Hash: B411AF76904280CFCB12CF54D5C4B16BF71FB84324F2886AADC050B667C33AD45ACBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248251263.000000000140D000.00000040.00000001.sdmp, Offset: 0140D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbe81e3938e82f720b3f793f2e82ea2844379fc96fd65bd39dcb77a792aa20fe
                                                              • Instruction ID: a7134a266cf13522b709cc62ef03bb7ada0e2cd3bdaaf1f32bd72bdb38d68195
                                                              • Opcode Fuzzy Hash: fbe81e3938e82f720b3f793f2e82ea2844379fc96fd65bd39dcb77a792aa20fe
                                                              • Instruction Fuzzy Hash: 130188619083809AE7125A9ACC84B67FB98DF51264F09856BEA055B3D7C3789448CAB1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248251263.000000000140D000.00000040.00000001.sdmp, Offset: 0140D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 33c2071fc34d0425a86c1eb80f41cfadc6b8d5dcadddb0b648c06d0bd4c2a965
                                                              • Instruction ID: 5255ff2e1830aeed075fd8778405f69636df95e3c6947ca6e925a76dafc53b78
                                                              • Opcode Fuzzy Hash: 33c2071fc34d0425a86c1eb80f41cfadc6b8d5dcadddb0b648c06d0bd4c2a965
                                                              • Instruction Fuzzy Hash: 68F068755043849AE7118A5ADC84763FFA8EF91634F18C45BED045B3D7C3799844CAB1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Non-executed Functions

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 034cbca5ac23be216cc35fcf3a092d0a5d1928ed995dd944f0bba4935c0f3681
                                                              • Instruction ID: 5a4a1fd4d0bb6921b43d9dc3b7dc9afb3239c7d0e21d064aa784a5b0672688be
                                                              • Opcode Fuzzy Hash: 034cbca5ac23be216cc35fcf3a092d0a5d1928ed995dd944f0bba4935c0f3681
                                                              • Instruction Fuzzy Hash: 86A18C32E406198FCF06DFB5C8445DEBBB2FF85308B15D56AE905AB221EB31A955CF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.248400996.0000000002EB0000.00000040.00000001.sdmp, Offset: 02EB0000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 17f915800597fea49211f488825a2afa76761361cc5c28575d8fd31b6fca231c
                                                              • Instruction ID: 9ff2a982d59d064d488b0c27ed2879bd6ab72f984ae8b414fb93ffbe44da6bfd
                                                              • Opcode Fuzzy Hash: 17f915800597fea49211f488825a2afa76761361cc5c28575d8fd31b6fca231c
                                                              • Instruction Fuzzy Hash: DCC149B1CD27668BDB10CF66F9981893B60BB85328FD14B08D161AF6D0D7B410EACF84
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Executed Functions

                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 050D4116
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID: pN3(
                                                              • API String ID: 4139908857-4053865088
                                                              • Opcode ID: 3d41785b41b0c4c743afd1e137d10bbc2672065fbbe3d49e58c3a944f09b4c13
                                                              • Instruction ID: a6fbe383eacd9e0bfc82ecebd1652f12d4282af4ba0f135a03b4100d5bdfcfa8
                                                              • Opcode Fuzzy Hash: 3d41785b41b0c4c743afd1e137d10bbc2672065fbbe3d49e58c3a944f09b4c13
                                                              • Instruction Fuzzy Hash: 34C17C70B007058FCB14EF79D589AAEFBF2FF88204B108929D40ADB751DB74E9458BA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: d9b85c09610644a0ecba848cf09dfa2de4103ee6699711591f95ed1c0c02f0e2
                                                              • Instruction ID: af13405867fc9850c68302f0e24aa14bb5419361f4789fcdd685b3889c890dd7
                                                              • Opcode Fuzzy Hash: d9b85c09610644a0ecba848cf09dfa2de4103ee6699711591f95ed1c0c02f0e2
                                                              • Instruction Fuzzy Hash: F9621C70E006198FDB64EF78C95869DB7F1AF89304F1089A9D54AAB354EF309E85CB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 096d0f3e2a4e209e0282b1a5ced579ea30b15f05485d5015905cd84f8d15fa7f
                                                              • Instruction ID: 7b279f0907a9ea43b7a4bdedb832ae363af95a619ffffeff43f1bc50bac04edc
                                                              • Opcode Fuzzy Hash: 096d0f3e2a4e209e0282b1a5ced579ea30b15f05485d5015905cd84f8d15fa7f
                                                              • Instruction Fuzzy Hash: 1A035B70B002148FEB64DB78D958BADBBF6AF89305F1484A9D48ADB381DB35DC85CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b86a36af70d745d7b5ab562d4d130a93304a05ba88825e3e9d9bb262096486dc
                                                              • Instruction ID: c76a3e408b5c77d9c3f12af95ddce008c055560d78eaea292dee6d975d464664
                                                              • Opcode Fuzzy Hash: b86a36af70d745d7b5ab562d4d130a93304a05ba88825e3e9d9bb262096486dc
                                                              • Instruction Fuzzy Hash: 5672AC74B00209CFDB51EFA8D988AADBBF5EB89304F2088A5E445EB355EB34DC45CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e17c5ffebf97911af929fd376836eaa41e9ebf50c56d272a62c10cf3f4e7a1bd
                                                              • Instruction ID: fb66c5b2d7808ab38d7f4aaeb664cf99b3846ff8d0b42d74dc169bb2e5599cec
                                                              • Opcode Fuzzy Hash: e17c5ffebf97911af929fd376836eaa41e9ebf50c56d272a62c10cf3f4e7a1bd
                                                              • Instruction Fuzzy Hash: 2E825B30A00209DFCB55CF68C984AAEBBF6FF48314F158599E5899F2A1DB30ED41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5b9402407d428bab08baf3b90cbcc4eb371bc40f8c0bedde4e35a44154fc9f59
                                                              • Instruction ID: 5784a33776221c712b6e470a60272660f590166c15f778348739e6fb17542ed9
                                                              • Opcode Fuzzy Hash: 5b9402407d428bab08baf3b90cbcc4eb371bc40f8c0bedde4e35a44154fc9f59
                                                              • Instruction Fuzzy Hash: 9D126F30A00219CFDB55CFA8C984AADBBFAFF88304F1580A9E985EB261D774DD45CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 256edf487b570876a84513552f88e17fa01d982f72bf2ad901cef7c853eb8df3
                                                              • Instruction ID: d0db56eeed1f124bdd4e9ade3b4d4e72e5be48a026ae7aa6c7fa831226206918
                                                              • Opcode Fuzzy Hash: 256edf487b570876a84513552f88e17fa01d982f72bf2ad901cef7c853eb8df3
                                                              • Instruction Fuzzy Hash: 61F18F70B0421A8FDB14DF68C894AAEBBF6BF88304F108469E546EB395DF34D945CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c7d4f50bd331b80e2821445a25270cbb118ae5da19211300128c2feba91f489f
                                                              • Instruction ID: b23fc497d414b4741d5757a4c88d4a50e9bf7be0dbf90bb45cf9a340667da9b2
                                                              • Opcode Fuzzy Hash: c7d4f50bd331b80e2821445a25270cbb118ae5da19211300128c2feba91f489f
                                                              • Instruction Fuzzy Hash: DDD1A074B003145FE764EB78D859BAEB6E6AFC8204F158878D546DB384EF74DC028791
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID: pN3($pN3(
                                                              • API String ID: 0-3161291624
                                                              • Opcode ID: 017fb247cf85f4dc6434fae49c51a442bf8e63171c42c71f299c903efdd72a91
                                                              • Instruction ID: 9a695c842fe1e5d3efc0c17e141fb2bee19b2e693129eb6de96aae4b7dc24a82
                                                              • Opcode Fuzzy Hash: 017fb247cf85f4dc6434fae49c51a442bf8e63171c42c71f299c903efdd72a91
                                                              • Instruction Fuzzy Hash: FB6124B5C04348AFCF12CFA9D884ACDBFB1BF49314F19816AE804AB261D7759995CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 050D51A2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID: pN3($pN3(
                                                              • API String ID: 716092398-3161291624
                                                              • Opcode ID: 4ddcf2ce024d047a402786bc292566da1f495e05a8db1d4761431b4712afad15
                                                              • Instruction ID: d58afd2043aa7e841215652b14032840f51ad1285dbdac97d6ca495da88bfaf5
                                                              • Opcode Fuzzy Hash: 4ddcf2ce024d047a402786bc292566da1f495e05a8db1d4761431b4712afad15
                                                              • Instruction Fuzzy Hash: 5951D0B5D00308DFDB14CF99D984ADEFBB5BF48314F64852AE819AB210D7749885CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 050D7F01
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID: pN3(
                                                              • API String ID: 2714655100-4053865088
                                                              • Opcode ID: ce5832e632292e04173ba78e5e8023671652422f7619ae9efcd81c7b852baaf2
                                                              • Instruction ID: b3f81379062b5effb6a4766138c28491613c61959514c49793e8105e97a07625
                                                              • Opcode Fuzzy Hash: ce5832e632292e04173ba78e5e8023671652422f7619ae9efcd81c7b852baaf2
                                                              • Instruction Fuzzy Hash: DB4118B4900309CFDB14CF59D489BAEFBF5FB88314F158999E519A7311D734A841CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 0105ECF1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID: pN3(
                                                              • API String ID: 3660427363-4053865088
                                                              • Opcode ID: 8fbca0f7c16de0acca622633b896d81b2ad8d5dabb404adb24181967ccc3f30e
                                                              • Instruction ID: d4cfa753c0c71f7d7db344acda4e14724873d81f0e22f3c8d20fb672534b0221
                                                              • Opcode Fuzzy Hash: 8fbca0f7c16de0acca622633b896d81b2ad8d5dabb404adb24181967ccc3f30e
                                                              • Instruction Fuzzy Hash: 8931FEB1D002589FCB60CF9AC988A8EFFF5BF48310F54842AE859AB340C7709945CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 0105ECF1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID: pN3(
                                                              • API String ID: 3660427363-4053865088
                                                              • Opcode ID: d0ec2f54695dbe67f36a803bf5e1367457d4542d402b5f5eb7e4273ba3fa5078
                                                              • Instruction ID: 89afa024fade55e6dfb5ec1e13efd32187eb96de514e343de3d0e633d4d6c2d5
                                                              • Opcode Fuzzy Hash: d0ec2f54695dbe67f36a803bf5e1367457d4542d402b5f5eb7e4273ba3fa5078
                                                              • Instruction Fuzzy Hash: 4931FEB1D002589FCB60CFAAD984A8EFFF5BF48310F55842AE859AB310D7709945CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 0105EA84
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID: pN3(
                                                              • API String ID: 71445658-4053865088
                                                              • Opcode ID: 96b2d2f419975b4087a8a6b4c68e55548620ceac0d7269bc634741e9537bb2b0
                                                              • Instruction ID: f08573472369bea9440d63c37ae371df45e619ae89afb52d32477c2ff94f745f
                                                              • Opcode Fuzzy Hash: 96b2d2f419975b4087a8a6b4c68e55548620ceac0d7269bc634741e9537bb2b0
                                                              • Instruction Fuzzy Hash: 1B3116B0D01248DFDB50CFA9C584A8EFFF5BF48314F28856AE849AB341C775A984CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 0105EA84
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID: pN3(
                                                              • API String ID: 71445658-4053865088
                                                              • Opcode ID: 674f10fa8be1bf5da81f1fc60da89e08b519bf3d0d72f64438adc66094a3cad8
                                                              • Instruction ID: ce09fa7ac4a07ff9a9d57fddbf6fc7de40e38147c8a8523d41f111a98c8a889c
                                                              • Opcode Fuzzy Hash: 674f10fa8be1bf5da81f1fc60da89e08b519bf3d0d72f64438adc66094a3cad8
                                                              • Instruction Fuzzy Hash: 2F3115B0D01249CFDB10CF99C588A8EFFF5BF48314F28855AE848AB341C374A984CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RtlEncodePointer.NTDLL(00000000), ref: 050DC212
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: EncodePointer
                                                              • String ID: pN3(
                                                              • API String ID: 2118026453-4053865088
                                                              • Opcode ID: e5183adca71d025ec749d67e5f19f764c780d0b68f254505c097902f84477fdf
                                                              • Instruction ID: c0be8a0895ff143bbd3923bd1001bea9efb1cbc208979779c68b9dcc75e0a6f4
                                                              • Opcode Fuzzy Hash: e5183adca71d025ec749d67e5f19f764c780d0b68f254505c097902f84477fdf
                                                              • Instruction Fuzzy Hash: D731E2758043858FEB10DFA8E9097AEBFF4FB46318F184059E484E7242CB795984CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,050D6B2E,?,?,?,?,?), ref: 050D6BEF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID: pN3(
                                                              • API String ID: 3793708945-4053865088
                                                              • Opcode ID: 1ae884a697c73e30621284c9e33f625a1f87377421b3675b2594b0ae2897d0ef
                                                              • Instruction ID: bba3ccff35b264eb55ad85de488eab179cd5320d082010b1e24b275cff53cfee
                                                              • Opcode Fuzzy Hash: 1ae884a697c73e30621284c9e33f625a1f87377421b3675b2594b0ae2897d0ef
                                                              • Instruction Fuzzy Hash: 3521E3B5900308AFDB10CF99D984AEEFBF9EB48324F14841AE915A7310D375A994CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,050D6B2E,?,?,?,?,?), ref: 050D6BEF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID: pN3(
                                                              • API String ID: 3793708945-4053865088
                                                              • Opcode ID: 7051d0a52cf2c9009ddf94943759c6ef1b95137135b182af93994df34431a1ce
                                                              • Instruction ID: 498612e78652e49499d06c71683054bd9828a19c6b7fb6420ebc29e67ae3c998
                                                              • Opcode Fuzzy Hash: 7051d0a52cf2c9009ddf94943759c6ef1b95137135b182af93994df34431a1ce
                                                              • Instruction Fuzzy Hash: D621E4B5900208AFDB10CF99D984ADEFBF9FB48324F14841AE915A3310D375A954CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RtlEncodePointer.NTDLL(00000000), ref: 050DC212
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: EncodePointer
                                                              • String ID: pN3(
                                                              • API String ID: 2118026453-4053865088
                                                              • Opcode ID: a7e796e717626a47f80f000b5772bcf0845213f4825132eaeff43cae567274d2
                                                              • Instruction ID: 554b9bfac023383020225ee83c2a6d281574d29b992a0fa3a73b274dc5500736
                                                              • Opcode Fuzzy Hash: a7e796e717626a47f80f000b5772bcf0845213f4825132eaeff43cae567274d2
                                                              • Instruction Fuzzy Hash: A1116A719013058FEB50DFA9E9487AEFBF4FB49318F148429D445E3640CB38AA84CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 050D4116
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID: pN3(
                                                              • API String ID: 4139908857-4053865088
                                                              • Opcode ID: c8fd131bc681ba407e4f760783b4f2c4f4ef8d046e19c574155a48c8629e5c44
                                                              • Instruction ID: 8d8d981dd7e14ede09bc062593d3cf91e76d506fa283fb8c4892c0d27fba2896
                                                              • Opcode Fuzzy Hash: c8fd131bc681ba407e4f760783b4f2c4f4ef8d046e19c574155a48c8629e5c44
                                                              • Instruction Fuzzy Hash: E711F3B6C003498BDB10CF9AD444BDEFBF4EF49224F15851AD469B7200D3B8A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 050D4116
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID: pN3(
                                                              • API String ID: 4139908857-4053865088
                                                              • Opcode ID: 7338fe4f6b6a29ec40c9eff08cf8f7a65c0f9b03d6a5dfdc406106c101bcb0cd
                                                              • Instruction ID: b98f3c04ef6dca4660c6e6f53c0d0a5d300ca928f15c9718b6ac436f08488c7d
                                                              • Opcode Fuzzy Hash: 7338fe4f6b6a29ec40c9eff08cf8f7a65c0f9b03d6a5dfdc406106c101bcb0cd
                                                              • Instruction Fuzzy Hash: D31134B5C007498FCB20CF9AD444BDEFBF4EB48224F15842AD429B7200C3B4A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 45d06743aa5773e488579fd9f8b5df47df7325554d1d1a9f9b73661484d47a9e
                                                              • Instruction ID: cb9a1599437eb5aa2b72d64d978e404d9bf1bb36852261579557dfcd35d5ed02
                                                              • Opcode Fuzzy Hash: 45d06743aa5773e488579fd9f8b5df47df7325554d1d1a9f9b73661484d47a9e
                                                              • Instruction Fuzzy Hash: A2615C34A10305DBDB54EFB8D55DAAEBBF2AF84304F108828E946AB344DF75A845CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: fb447263cc545e5064f1f52080764e30cc89015da951bf94bcb4788e910db6b9
                                                              • Instruction ID: cf49239e3f429396370dd82eaafb8f29b9078a1f44097e50e347c32249543fe4
                                                              • Opcode Fuzzy Hash: fb447263cc545e5064f1f52080764e30cc89015da951bf94bcb4788e910db6b9
                                                              • Instruction Fuzzy Hash: B451DF31B103069FCB45EBB4D858AEEBBB6AF85304F14896AD442DB291EF74D805CB61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 918e3734b4f0ad2723c4e7b24842dfce791b48a317b7c1a9a48eaf3837c151c1
                                                              • Instruction ID: 850c403ab016f88d63ab63e56c379a985dfc29b24da12b4abf1ddb679d79cd57
                                                              • Opcode Fuzzy Hash: 918e3734b4f0ad2723c4e7b24842dfce791b48a317b7c1a9a48eaf3837c151c1
                                                              • Instruction Fuzzy Hash: 1351A571B102059FCB14EBB4D998AEEB7B6FF84204F148969D5529B344DF70D904CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,050D6B2E,?,?,?,?,?), ref: 050D6BEF
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.621216028.00000000050D0000.00000040.00000001.sdmp, Offset: 050D0000, based on PE: false
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: f8b2eb5fe22bcb8a8afd4692053709788998febdb29621c6bdbbdef2f9e788d8
                                                              • Instruction ID: 9436bdbaec9edda79d30d84a1ff2cb7fa485233422acb622baa8bea6697fdbab
                                                              • Opcode Fuzzy Hash: f8b2eb5fe22bcb8a8afd4692053709788998febdb29621c6bdbbdef2f9e788d8
                                                              • Instruction Fuzzy Hash: 41414978A502489FE7409F68EA8ABA97FB5FB49314F104429F9129B7C4DFB44981CF21
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617865068.0000000001050000.00000040.00000001.sdmp, Offset: 01050000, based on PE: false
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: b48227094579b4a256bf106ce59ae2c21f4c967988ff31d2cdb278d15e7e7c4b
                                                              • Instruction ID: 86239ad7dab6f0e1cda449198fb4562859c41b2253489431f721e1bf12da5d7e
                                                              • Opcode Fuzzy Hash: b48227094579b4a256bf106ce59ae2c21f4c967988ff31d2cdb278d15e7e7c4b
                                                              • Instruction Fuzzy Hash: 0031AD70A10348DFC751DFA8D498A9ABBF2FF45304F6184A9E401AB291EB36A846CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a9a5a0d4ce607884bb0be70c755226612e251590a9c0b37a4e32a81e1b68069a
                                                              • Instruction ID: 9ed117fafa1566a37e0ccee16ddaf05c71cf5e0ae7881d46ebd4bd7e56896d91
                                                              • Opcode Fuzzy Hash: a9a5a0d4ce607884bb0be70c755226612e251590a9c0b37a4e32a81e1b68069a
                                                              • Instruction Fuzzy Hash: 4A726130A0411C8FEB64DBA4C854FAE7BB6EF85344F1180A9C20AAB399DF359D45DF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9956aec95cc99973b99b395600413c1a152e8688386e71507c6291fdd3042503
                                                              • Instruction ID: c0f10d86e18863082a8afbdf5b0dc11cbc3d796069cdfa5431a7ebaceee9bb7b
                                                              • Opcode Fuzzy Hash: 9956aec95cc99973b99b395600413c1a152e8688386e71507c6291fdd3042503
                                                              • Instruction Fuzzy Hash: D7F1AF70B0D3858FC346977888546A97BF59F96304F1A80F6D189CB697FA78CC0AC722
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a1ea62b3b2823e7eb7cc40d73d858fc449281da7dbf4361d6d6673decfb16e39
                                                              • Instruction ID: 8f01eb9aa1c19f092fdd35d37ca1378f9d6a506bf0aa922927a081a71a2eb9e1
                                                              • Opcode Fuzzy Hash: a1ea62b3b2823e7eb7cc40d73d858fc449281da7dbf4361d6d6673decfb16e39
                                                              • Instruction Fuzzy Hash: 5FD10435B043158FDB55DB78C8446BEBBFAAF85304F0484AAE186DB291DB38DC46CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d963338ddd474f808369e9540ead6e4e321a864169294c85a45084ea74b82e61
                                                              • Instruction ID: 2103e49bd79016e30568e214335dbb79fcdec8126da2ae1151a7aec7439c4ed9
                                                              • Opcode Fuzzy Hash: d963338ddd474f808369e9540ead6e4e321a864169294c85a45084ea74b82e61
                                                              • Instruction Fuzzy Hash: 11C1E0347042158FEB199B68C898A7E7BF6BFC9244F058469E586CB384CF38DC41CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5f4af40d012b724c008bda60c89fc33aadaa83e8a62ef4dcd6d83a409a22bf26
                                                              • Instruction ID: 7fdca5972ece5ae29aaeef1b569644d0edec9441cda5c6bc1454efa9e8a7f703
                                                              • Opcode Fuzzy Hash: 5f4af40d012b724c008bda60c89fc33aadaa83e8a62ef4dcd6d83a409a22bf26
                                                              • Instruction Fuzzy Hash: C6B121387043148FDB25EB38C85463E7BAAEF84214F1584AAE542CB399DF35DC42C791
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be402351f7b5e27bc291a8eb6510e26bddb91edadab6d29dca75fc894ef9b029
                                                              • Instruction ID: f817129111b96bbed18bdc783ed879ed69fc802165c6a9f115eeffe1f6654f57
                                                              • Opcode Fuzzy Hash: be402351f7b5e27bc291a8eb6510e26bddb91edadab6d29dca75fc894ef9b029
                                                              • Instruction Fuzzy Hash: ABD1E875A00114CFCB55CF6DD5889ADBBFAAF88314B1A84A9E545EB362DB30EC41CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 798d54c46c1007b897a24fe4eef88786ce6dbc81df653129ed2b445f7b93cd1e
                                                              • Instruction ID: 5971bf83f480e6a191e67eeb8c51fe29f99b2cf98bed5751bbb00dff3076af97
                                                              • Opcode Fuzzy Hash: 798d54c46c1007b897a24fe4eef88786ce6dbc81df653129ed2b445f7b93cd1e
                                                              • Instruction Fuzzy Hash: A3B15BB0F002099BEFA1DB9CD4847ADB7F5EB45314F208966E495DB352DB34DC818B91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1e7f054af77c37c0cec7e64c1b1bf20df474917e61a2eb74b7e4924371e1b360
                                                              • Instruction ID: 15260777ef966ad154a4c8452a1fe8eec8c33d090188ceba08f9db6e3fdedce3
                                                              • Opcode Fuzzy Hash: 1e7f054af77c37c0cec7e64c1b1bf20df474917e61a2eb74b7e4924371e1b360
                                                              • Instruction Fuzzy Hash: 49C16F30A00209DFDB55CF69C984A9EBBFABF48314F158559E989EB361D730ED41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bda4bfc30f751edbb823bc4f3c20a414aaea7fa0c89245593707895ceda7b9f8
                                                              • Instruction ID: e283f7dd5f4ec2b5896c17ce11f54a2b571ebf5a4c75cf0ae60aae49c78cad24
                                                              • Opcode Fuzzy Hash: bda4bfc30f751edbb823bc4f3c20a414aaea7fa0c89245593707895ceda7b9f8
                                                              • Instruction Fuzzy Hash: 8071CE3070D3858FD3439778981966A7BF59B82318F1680FBD188CF697EA69CC46C761
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf69fad5fd23fdcc8abc8432e6ea629b6cf8829f0adf579da2737b0b9b5cec95
                                                              • Instruction ID: 0d32f4ba9f33a3f180a9c3a91e11d72a1cd4c2214c0d212da09323ba394068fc
                                                              • Opcode Fuzzy Hash: bf69fad5fd23fdcc8abc8432e6ea629b6cf8829f0adf579da2737b0b9b5cec95
                                                              • Instruction Fuzzy Hash: D081DC34B002098FDB58DF6DC4889AEBBFABFC9255B1580A9D546DB365DB31EC01CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0c840ef0288735d3009d122f03d855d9029f52940ccd6a9976cd18309fdcb4cf
                                                              • Instruction ID: fd84581df5b155e636845ddbcf4a7190bec74a268e7ceeb6fe7337be78c77250
                                                              • Opcode Fuzzy Hash: 0c840ef0288735d3009d122f03d855d9029f52940ccd6a9976cd18309fdcb4cf
                                                              • Instruction Fuzzy Hash: D191B171E00118CFCB45CFA9D98899DBBFABF48314F1A8499E559EB262CB30EC41CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 71a0153f1206c5aa87971ae00fc342b05ca11bf9cd6338254a1478ddf2f7cf55
                                                              • Instruction ID: 9d595dfd62989253a613745fbfc64bc702e5dc216c0f97ab7f1d0f908d33685a
                                                              • Opcode Fuzzy Hash: 71a0153f1206c5aa87971ae00fc342b05ca11bf9cd6338254a1478ddf2f7cf55
                                                              • Instruction Fuzzy Hash: E4616B303041198FDB54DF3ED884A6ABBEDBF45754B0544A9F68ACF266EB21DC00CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8cf3f90e5c9aad5463a9be9ac70695808ba48c27c03d2f7557b4b07e448d3160
                                                              • Instruction ID: 4bf025bc6e21e1619757499dd7d5e9389bc66157cd61758855fe33993810bfb4
                                                              • Opcode Fuzzy Hash: 8cf3f90e5c9aad5463a9be9ac70695808ba48c27c03d2f7557b4b07e448d3160
                                                              • Instruction Fuzzy Hash: 3F4129747001199FDB15DF29D988AAE7BB9FF89314F1000A9F94A8B3A1CB71DD40CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6b82d0ab141dc456d8983fae62991521cbb525da0e25cfe410269837135fe952
                                                              • Instruction ID: bc0b27c61657816fdcc20a5d3f066605e66da81e874ceb09e85fa6577a961ed8
                                                              • Opcode Fuzzy Hash: 6b82d0ab141dc456d8983fae62991521cbb525da0e25cfe410269837135fe952
                                                              • Instruction Fuzzy Hash: 8D41A031300219DFCF429F68E954AAEBBF6EF88300F044069F946CB291DF35C9669B90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 01ca231e5ecad0502cb3b29acbee5c886cc9b89ea7b76fef1205ed4adeb6b97d
                                                              • Instruction ID: 26c6ffb5e935f9c3a4bfb0232aa2ed3712675562670cfae1810cdd9d6ea792eb
                                                              • Opcode Fuzzy Hash: 01ca231e5ecad0502cb3b29acbee5c886cc9b89ea7b76fef1205ed4adeb6b97d
                                                              • Instruction Fuzzy Hash: 1C31B070B002418FDB69AF78D458AAEBBF6AF89204B108868D046DB754EF348D05CF92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55f9d7505621d0e79c40579fe6d3c93319b37a300d4d4765dbf207c1c1f45d33
                                                              • Instruction ID: 6c972cfe2ec447708fd7663734e6bc8a6b075b29661cfa847961d33874ec8b35
                                                              • Opcode Fuzzy Hash: 55f9d7505621d0e79c40579fe6d3c93319b37a300d4d4765dbf207c1c1f45d33
                                                              • Instruction Fuzzy Hash: 4631A070B002058FDB59AB79D45CAAEBBE6AF88244B108869D406DB744EF34DD05CB92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2adb99820baa1ee1996a8399f981c8bdbdc2d29f9ea20f3f2848fb189188bc39
                                                              • Instruction ID: 58460493b0682d8c85bbcbf5a7a6f7f260964eba13c824a57bf362ff00e1dece
                                                              • Opcode Fuzzy Hash: 2adb99820baa1ee1996a8399f981c8bdbdc2d29f9ea20f3f2848fb189188bc39
                                                              • Instruction Fuzzy Hash: 7221F5303042154BDB6A6639A89853E7EEFAFC5654B0440B9E94ACF3D2DF68CC4197D2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 798cc6d2ae5046ae2cbbb1f42552d7885d678d5663e8b246c215a849213edf92
                                                              • Instruction ID: 84b9ef77624c3af4fb486758d180ab4882bd4d7092cc22ad319d6bd217112c3f
                                                              • Opcode Fuzzy Hash: 798cc6d2ae5046ae2cbbb1f42552d7885d678d5663e8b246c215a849213edf92
                                                              • Instruction Fuzzy Hash: D821F2303002054BEB696629E89867E7AEFAFC4608F148079E54ACF3D5DF69CC4293D1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc24a81cf95b2d7c7966506efdc86138bca8c8c36677901d277e866187b96889
                                                              • Instruction ID: 9fd83e2add1e21a104053615fc4273da594f48d18c5979566a305a15f189f767
                                                              • Opcode Fuzzy Hash: bc24a81cf95b2d7c7966506efdc86138bca8c8c36677901d277e866187b96889
                                                              • Instruction Fuzzy Hash: D031AD70A04349CFCB41DF78D984AEDBBF2EF89314F2484AAD588EB252E7359945CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.618106559.000000000124D000.00000040.00000001.sdmp, Offset: 0124D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3096c3c0ada069b3a5f74784ed3ec33a64029bf066400799757b8e96afb9b05f
                                                              • Instruction ID: b9f9be474004014ced91228ea3c75be25745ea4cd97671fad58607b1757465e7
                                                              • Opcode Fuzzy Hash: 3096c3c0ada069b3a5f74784ed3ec33a64029bf066400799757b8e96afb9b05f
                                                              • Instruction Fuzzy Hash: 05216771518248DFCB19CF64D8C4B16BB61FB94354F20C96DD90A4B246C37AD847CB61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dbd7a0c25c3e4ea7ab7fe653dae4df62fcb9daa2cc722dd5f62d31b0d12fb1dd
                                                              • Instruction ID: a1b2754b0ce4bde60ec4a014fd1085932da15be453b81c2d8bc68168b3038457
                                                              • Opcode Fuzzy Hash: dbd7a0c25c3e4ea7ab7fe653dae4df62fcb9daa2cc722dd5f62d31b0d12fb1dd
                                                              • Instruction Fuzzy Hash: 07219070A042198FCB09CF68C8849AEBBF6BF85324B158155E655DB3A5DB34AC52CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0369b354ee616fce274b4ecdc55469349195b4cc6b13d3874f89b3b1b716eec6
                                                              • Instruction ID: 10ca490b5193029c0008b2a11ad8e5395668b45f8320b3a5409847856ebd3f0e
                                                              • Opcode Fuzzy Hash: 0369b354ee616fce274b4ecdc55469349195b4cc6b13d3874f89b3b1b716eec6
                                                              • Instruction Fuzzy Hash: 8B21903070D3814FD343977888186167BF59F83304F1A80E6D089CF2A7EA69CC4AC762
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.618106559.000000000124D000.00000040.00000001.sdmp, Offset: 0124D000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 97df5b42a839a4f6ee10fd34d0c8fbd896b08054d63f5fe35b877c1ec5f48414
                                                              • Instruction ID: 8baf1ebe98afa6000d7d6af6a9c6f355910cfb9f755317ed305a7a8f7fe77974
                                                              • Opcode Fuzzy Hash: 97df5b42a839a4f6ee10fd34d0c8fbd896b08054d63f5fe35b877c1ec5f48414
                                                              • Instruction Fuzzy Hash: 5321C2754083849FCB07CF24D994B11BF71EB46314F28C5DAD8458B257C33AD85ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 40db357d62c6b7f492c87f360d4ca87427cec306b5c8202132e641b893103aa4
                                                              • Instruction ID: 121c0b0b0ca74ff2e3b2c64a7c6de14ff710bcc84f01f092a54fee67f8645cfd
                                                              • Opcode Fuzzy Hash: 40db357d62c6b7f492c87f360d4ca87427cec306b5c8202132e641b893103aa4
                                                              • Instruction Fuzzy Hash: F711BF3570D7814FD342873898146657FF99B86268B1980EBE189CB2A2E669CC0AC311
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6aca7b33e2782b9b1e7ca6ac8c09b65bbc14be4e6cc245718063ae4751eb1c21
                                                              • Instruction ID: e74dd233b76c1953e2563ce53fcea257f2984c220b167df7a7b7975446883328
                                                              • Opcode Fuzzy Hash: 6aca7b33e2782b9b1e7ca6ac8c09b65bbc14be4e6cc245718063ae4751eb1c21
                                                              • Instruction Fuzzy Hash: C211D6353016118FD7199A29D49897EBBEAFFC86A5B0941B9E946CB350DF30DC4287D0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 779da5e7505e87da8cd70ae76dd88a5b948b0684a23f061707ec5a26aa5c96d8
                                                              • Instruction ID: 083704efb35ee6bc0e36da7be2fc710f9f869b88a9a19b808e470bcec93a2ca2
                                                              • Opcode Fuzzy Hash: 779da5e7505e87da8cd70ae76dd88a5b948b0684a23f061707ec5a26aa5c96d8
                                                              • Instruction Fuzzy Hash: EA1104B290D3A54FC703DB3844495EB7FB49E46250B0909EEC4C6D7152F7648A16C7C2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 68dd00b22dc52c47f88f28438237f898c6ada382c2b2b64a6506afda33aea121
                                                              • Instruction ID: 63f214940618f5e47ffde361f413b2bb20c122c355d8fe5cb969e248007330b5
                                                              • Opcode Fuzzy Hash: 68dd00b22dc52c47f88f28438237f898c6ada382c2b2b64a6506afda33aea121
                                                              • Instruction Fuzzy Hash: 37118B75A00208DFCB21CF98C948BAABBFAEF48314F00C56AE55A9B652D374DD58CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: edf1f013c09701b68061b9bebf134754a8b48dfa65e83b15c26f3a9ff94de9a8
                                                              • Instruction ID: 10326839ea3351c7cdca2a75379f0d575f22c76e487931044ae95400b74e9492
                                                              • Opcode Fuzzy Hash: edf1f013c09701b68061b9bebf134754a8b48dfa65e83b15c26f3a9ff94de9a8
                                                              • Instruction Fuzzy Hash: 42118231700219DFCB519F28E945AAEBBE9EFC8315F084069F94687241DB70C951CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7b7170db93523b9543a573f8297e22446c7ab300d9b481d4036fadf112aa60a5
                                                              • Instruction ID: f4f2128ea88299c1fae2046980bb21316ab9373caa7b179bbc12ce44309c2f94
                                                              • Opcode Fuzzy Hash: 7b7170db93523b9543a573f8297e22446c7ab300d9b481d4036fadf112aa60a5
                                                              • Instruction Fuzzy Hash: 48118234F101198FCB80EFB9D4499AE7BF5FB8C2157008465E55AD3348EF309D028B90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5461290804bf46ee85c1905be90eccc75478fda6ed87a350734eb06d4f144907
                                                              • Instruction ID: 5dd8f0626848a2b2eaf70286f576339665ef9480d8b0ed8d706b68003d6296c5
                                                              • Opcode Fuzzy Hash: 5461290804bf46ee85c1905be90eccc75478fda6ed87a350734eb06d4f144907
                                                              • Instruction Fuzzy Hash: 8E01D136B001256B9F059E699840ABF7BEBEBCC690B18802DF605D7280DE718D118BE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5fac8ea2fd31e35de9ca34f64db4697e3e889166b588a93309d3792d5e16df02
                                                              • Instruction ID: bd01f3465a09287fa011e8255c11d5f3c986b753e2f9d52f9071bfa653cc5702
                                                              • Opcode Fuzzy Hash: 5fac8ea2fd31e35de9ca34f64db4697e3e889166b588a93309d3792d5e16df02
                                                              • Instruction Fuzzy Hash: 2A01D13A6001596FEB02CE689810AEF3FFAEBC8650F19806AF505C7191DA3189159BA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fec4164ea6d141061afb2d7be797b2c33ad017e2119b89a32505acb19e07eaa7
                                                              • Instruction ID: 78240009bb9bf084f97fe1391400d10496a131f26f0d56b7d94231b1b4051c50
                                                              • Opcode Fuzzy Hash: fec4164ea6d141061afb2d7be797b2c33ad017e2119b89a32505acb19e07eaa7
                                                              • Instruction Fuzzy Hash: EF01F4B2E043659FC752DB7898496BF7FF8EB89214B0509ADD58AD7202F7708921CBD0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1feb73dc5f11d5ed6bd36f66e42db882bf78e42b0da9a7ac3cc9d7c0aedd89c
                                                              • Instruction ID: 7f70acf77a522923f7cdb9923b0812344fa05887d338392c7f2c706eedde981d
                                                              • Opcode Fuzzy Hash: d1feb73dc5f11d5ed6bd36f66e42db882bf78e42b0da9a7ac3cc9d7c0aedd89c
                                                              • Instruction Fuzzy Hash: 7B01F674E002199FCB40DFA9D984A9EBBF5FB88310F00812AE909E7341D7349914CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 185627934d69b1595093af3a2e40622c6e0c0b5174dd8c6f6571e3289acd0581
                                                              • Instruction ID: c598bb6f7e43e21c96a67ad24629ad44a57ef1b6219160a13d152cd568a450cd
                                                              • Opcode Fuzzy Hash: 185627934d69b1595093af3a2e40622c6e0c0b5174dd8c6f6571e3289acd0581
                                                              • Instruction Fuzzy Hash: A8F0B4353543008FD705DB39E814A6A3BFAAF8522531940EAF505CB2B1EAB5DC018760
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2dac9437adde7ec347bf29d1a813cb4a58dd0e4d37a11f2fe6d693d9b7e5144b
                                                              • Instruction ID: 2f42107207df547e763ee2934924739b55a5fa1b5067e83bd93be3a797b499ac
                                                              • Opcode Fuzzy Hash: 2dac9437adde7ec347bf29d1a813cb4a58dd0e4d37a11f2fe6d693d9b7e5144b
                                                              • Instruction Fuzzy Hash: DAF065353102008FDB14EB2EE844E2A77EDAFC565571540A9F509CB371DE71DC008790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 37fb945214ec62b96b6b0f3ef3c828efaa93e040e2979964a4d8880a72c5af50
                                                              • Instruction ID: b79d193d9bccdbee71084a3f668e2346979476391ab51f46e1d829f7df3a3669
                                                              • Opcode Fuzzy Hash: 37fb945214ec62b96b6b0f3ef3c828efaa93e040e2979964a4d8880a72c5af50
                                                              • Instruction Fuzzy Hash: 42E0C939B101198BCF44EBA8E44D4DCB7F1BB882257014465E54AE7398EF3498118B61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 13313bbeffe36c19d5f7fe0510d48fac1420a4ca255e383908e8db3c75ae558b
                                                              • Instruction ID: 75174c97f9425fa59740969da931458ede9e79f219b2645b28bd623d47a763e8
                                                              • Opcode Fuzzy Hash: 13313bbeffe36c19d5f7fe0510d48fac1420a4ca255e383908e8db3c75ae558b
                                                              • Instruction Fuzzy Hash: D8E01275E001199F8750EBADA8095AF7FF9EA88251B040876E519E3200EB7049018BD1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 309f276aac4a2364693ae9a090b4cc3313cb7fb3ea66cd453a6999ee86575e32
                                                              • Instruction ID: a7425a602cff552dd64c46d5ca84b56e8a7c1e5f5f6ecf3ea06a1994653ed3ed
                                                              • Opcode Fuzzy Hash: 309f276aac4a2364693ae9a090b4cc3313cb7fb3ea66cd453a6999ee86575e32
                                                              • Instruction Fuzzy Hash: F4E0C23003C38049C742EB74AD824A03BA24E830053064EA6E0C5CB966EBACC519CB52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.617904299.0000000001060000.00000040.00000001.sdmp, Offset: 01060000, based on PE: false
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5ca6f1658bbf74ea2bc0c5c83148bce1850569c9dcac7b9f493ca1d21887cea4
                                                              • Instruction ID: 484c48b0ab187f45808e5849e481b7c63ccfb70826cc7e5606f1e1b5bb0ddfeb
                                                              • Opcode Fuzzy Hash: 5ca6f1658bbf74ea2bc0c5c83148bce1850569c9dcac7b9f493ca1d21887cea4
                                                              • Instruction Fuzzy Hash: 14C0123042C20686C641FF68ED47865339A5AC11093408D25A1854A668AFB4D545C786
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Non-executed Functions