Loading ...

Play interactive tourEdit tour

Analysis Report W9YDH79i8G.exe

Overview

General Information

Sample Name:W9YDH79i8G.exe
Analysis ID:412503
MD5:cdebc3e47db1dbeac624dd329c1a9ae1
SHA1:ceee8ff397069a606b3bbef0d54a4175a1de9a0e
SHA256:0fa77ee6af812f5513bf0ae73a02143a4ed3a037e884aeccc57576f460a9ea57
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Contains functionality to register a low level keyboard hook
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • W9YDH79i8G.exe (PID: 5656 cmdline: 'C:\Users\user\Desktop\W9YDH79i8G.exe' MD5: CDEBC3E47DB1DBEAC624DD329C1A9AE1)
    • schtasks.exe (PID: 6168 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\KcsilHD' /XML 'C:\Users\user\AppData\Local\Temp\tmp4276.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • W9YDH79i8G.exe (PID: 6232 cmdline: C:\Users\user\Desktop\W9YDH79i8G.exe MD5: CDEBC3E47DB1DBEAC624DD329C1A9AE1)
    • W9YDH79i8G.exe (PID: 6248 cmdline: C:\Users\user\Desktop\W9YDH79i8G.exe MD5: CDEBC3E47DB1DBEAC624DD329C1A9AE1)
    • W9YDH79i8G.exe (PID: 6280 cmdline: C:\Users\user\Desktop\W9YDH79i8G.exe MD5: CDEBC3E47DB1DBEAC624DD329C1A9AE1)
    • W9YDH79i8G.exe (PID: 6316 cmdline: C:\Users\user\Desktop\W9YDH79i8G.exe MD5: CDEBC3E47DB1DBEAC624DD329C1A9AE1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "shekhar@ocl-india.icu@Mexico1.,mail.privateemail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 10 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.W9YDH79i8G.exe.4428d80.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.W9YDH79i8G.exe.4428d80.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.W9YDH79i8G.exe.4428d80.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.W9YDH79i8G.exe.4428d80.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    7.2.W9YDH79i8G.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "shekhar@ocl-india.icu@Mexico1.,mail.privateemail.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\KcsilHD.exeReversingLabs: Detection: 40%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: W9YDH79i8G.exeVirustotal: Detection: 35%Perma Link
                      Source: W9YDH79i8G.exeReversingLabs: Detection: 40%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\KcsilHD.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: W9YDH79i8G.exeJoe Sandbox ML: detected
                      Source: 7.2.W9YDH79i8G.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: W9YDH79i8G.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: W9YDH79i8G.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0BCE62D8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0BCE638C
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0BCE62C8
                      Source: global trafficTCP traffic: 192.168.2.7:49736 -> 198.54.122.60:587
                      Source: Joe Sandbox ViewIP Address: 198.54.122.60 198.54.122.60
                      Source: global trafficTCP traffic: 192.168.2.7:49736 -> 198.54.122.60:587
                      Source: unknownDNS traffic detected: queries for: mail.privateemail.com
                      Source: W9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: W9YDH79i8G.exe, 00000007.00000002.497762134.00000000032B3000.00000004.00000001.sdmpString found in binary or memory: http://3yctoQGYo4sp.com
                      Source: W9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: W9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpString found in binary or memory: http://HVIItO.com
                      Source: W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: W9YDH79i8G.exe, 00000007.00000002.506767918.0000000007060000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                      Source: W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpString found in binary or memory: http://mail.privateemail.com
                      Source: W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: W9YDH79i8G.exe, 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, W9YDH79i8G.exe, 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: W9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Contains functionality to register a low level keyboard hookShow sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_01706948 SetWindowsHookExW 0000000D,00000000,?,?7_2_01706948
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 7.2.W9YDH79i8G.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b803C5E9Cu002d14DDu002d4654u002dAB48u002d30D470F4522Du007d/u00317C32930u002d2054u002d481Au002dB4A9u002d68C206A86293.csLarge array initialization: .cctor: array initializer size 11936
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_00F02E250_2_00F02E25
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE511C0_2_0BCE511C
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE18F80_2_0BCE18F8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE30480_2_0BCE3048
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE1FB80_2_0BCE1FB8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE25D00_2_0BCE25D0
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE15880_2_0BCE1588
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE33F80_2_0BCE33F8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE18E80_2_0BCE18E8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE30390_2_0BCE3039
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE1FA80_2_0BCE1FA8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE07000_2_0BCE0700
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE07100_2_0BCE0710
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE36260_2_0BCE3626
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE25C00_2_0BCE25C0
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE35C10_2_0BCE35C1
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE15780_2_0BCE1578
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE34080_2_0BCE3408
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 3_2_00242E253_2_00242E25
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 4_2_00322E254_2_00322E25
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 6_2_00142E256_2_00142E25
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_00F22E257_2_00F22E25
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_014C56087_2_014C5608
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_014C46C07_2_014C46C0
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_014C06A87_2_014C06A8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_016F3F787_2_016F3F78
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_016FEE687_2_016FEE68
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_016F4A477_2_016F4A47
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_016F9E587_2_016F9E58
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_016FB2407_2_016FB240
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_017011B07_2_017011B0
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_017048707_2_01704870
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_017081E87_2_017081E8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_017359587_2_01735958
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173E0D07_2_0173E0D0
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_017366B87_2_017366B8
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173EAB87_2_0173EAB8
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\KcsilHD.exe 0FA77EE6AF812F5513BF0AE73A02143A4ED3A037E884AECCC57576F460A9EA57
                      Source: W9YDH79i8G.exeBinary or memory string: OriginalFilename vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000000.00000002.259927781.000000000C360000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameJUZFLaLNGVPGsrhHohqG.exe4 vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000000.00000002.252651996.00000000032F1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000000.00000002.258927770.0000000006750000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000000.00000002.260065297.000000000C460000.00000002.00000001.sdmpBinary or memory string: originalfilename vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000000.00000002.260065297.000000000C460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exeBinary or memory string: OriginalFilename vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exeBinary or memory string: OriginalFilename vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exeBinary or memory string: OriginalFilename vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exeBinary or memory string: OriginalFilename vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000007.00000002.496407374.00000000016E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000007.00000002.506580834.0000000006BA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000007.00000002.495042484.0000000001388000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameJUZFLaLNGVPGsrhHohqG.exe4 vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exe, 00000007.00000002.496608102.0000000001710000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exeBinary or memory string: OriginalFilenameAsyncCausalityTracer.exeR vs W9YDH79i8G.exe
                      Source: W9YDH79i8G.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: W9YDH79i8G.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: KcsilHD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 7.2.W9YDH79i8G.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.2.W9YDH79i8G.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 0.2.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 0.2.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 3.2.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 3.2.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 7.2.W9YDH79i8G.exe.f20000.1.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 7.2.W9YDH79i8G.exe.f20000.1.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 7.2.W9YDH79i8G.exe.f20000.1.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 0.0.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 0.0.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 4.0.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 4.0.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 4.0.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 6.0.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 6.0.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 4.0.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 4.0.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 4.2.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 4.2.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 3.0.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 3.0.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 4.2.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 4.2.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 4.2.W9YDH79i8G.exe.320000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 0.2.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 0.2.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 0.0.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 0.0.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 0.0.W9YDH79i8G.exe.f00000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 6.2.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 6.2.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 7.0.W9YDH79i8G.exe.f20000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 7.0.W9YDH79i8G.exe.f20000.0.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: W9YDH79i8G.exe, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: W9YDH79i8G.exe, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: W9YDH79i8G.exe, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 3.0.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 3.0.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 3.0.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: W9YDH79i8G.exe, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: W9YDH79i8G.exe, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: KcsilHD.exe.0.dr, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: KcsilHD.exe.0.dr, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: KcsilHD.exe.0.dr, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 7.0.W9YDH79i8G.exe.f20000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 7.0.W9YDH79i8G.exe.f20000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 7.0.W9YDH79i8G.exe.f20000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 3.2.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 3.2.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 3.2.W9YDH79i8G.exe.240000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: KcsilHD.exe.0.dr, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: KcsilHD.exe.0.dr, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 7.2.W9YDH79i8G.exe.f20000.1.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Void TCP_Protocol.Packet::set_Payload(System.Byte[])
                      Source: 7.2.W9YDH79i8G.exe.f20000.1.unpack, TCP_Protocol/Packet.csSuspicious method names: System.Byte[] TCP_Protocol.Packet::get_Payload()
                      Source: 6.2.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 6.2.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 6.2.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: 6.0.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Object TCP_Protocol.TypeExt::PayloadGet(TCP_Protocol.Packet)
                      Source: 6.0.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: TCP_Protocol.Packet TCP_Protocol.TypeExt::PayloadSet(TCP_Protocol.Packet&,System.Byte[])
                      Source: 6.0.W9YDH79i8G.exe.140000.0.unpack, TCP_Protocol/TypeExt.csSuspicious method names: System.Boolean TCP_Protocol.TypeExt::PayloadValidate(TCP_Protocol.Packet)
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/4@1/1
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile created: C:\Users\user\AppData\Roaming\KcsilHD.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6188:120:WilError_01
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeMutant created: \Sessions\1\BaseNamedObjects\xZakExqTbRWYflheguXiulchcZp
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4276.tmpJump to behavior
                      Source: W9YDH79i8G.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: W9YDH79i8G.exeVirustotal: Detection: 35%
                      Source: W9YDH79i8G.exeReversingLabs: Detection: 40%
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile read: C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe 'C:\Users\user\Desktop\W9YDH79i8G.exe'
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\KcsilHD' /XML 'C:\Users\user\AppData\Local\Temp\tmp4276.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exe
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exe
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exe
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exe
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\KcsilHD' /XML 'C:\Users\user\AppData\Local\Temp\tmp4276.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: W9YDH79i8G.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: W9YDH79i8G.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 0_2_0BCE7025 push FFFFFF8Bh; iretd 0_2_0BCE7027
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_014C3850 pushad ; iretd 7_2_014C3851
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D550 pushfd ; retf 7_2_0173D591
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D500 pushfd ; retf 7_2_0173D501
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D468 pushfd ; retf 7_2_0173D4AD
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D468 pushfd ; retf 7_2_0173D4D9
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D45C pushfd ; retf 7_2_0173D461
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4F0 pushfd ; retf 7_2_0173D4F1
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4F4 pushfd ; retf 7_2_0173D4F5
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4F8 pushfd ; retf 7_2_0173D4F9
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4E0 pushfd ; retf 7_2_0173D4E1
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4E4 pushfd ; retf 7_2_0173D4E5
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4E8 pushfd ; retf 7_2_0173D4E9
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4EC pushfd ; retf 7_2_0173D4ED
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D4DC pushfd ; retf 7_2_0173D4DD
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D378 pushfd ; retf 7_2_0173D37D
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D32C pushfd ; retf 7_2_0173D331
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D3D0 pushfd ; retf 7_2_0173D415
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D3C4 pushfd ; retf 7_2_0173D3C9
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173B39F push edi; retn 0000h7_2_0173B3A1
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D2E0 pushfd ; retf 7_2_0173D2E5
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_0173D294 pushfd ; retf 7_2_0173D299
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.98266183828
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.98266183828
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile created: C:\Users\user\AppData\Roaming\KcsilHD.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\KcsilHD' /XML 'C:\Users\user\AppData\Local\Temp\tmp4276.tmp'
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: W9YDH79i8G.exe PID: 5656, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWindow / User API: threadDelayed 3877Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWindow / User API: threadDelayed 5920Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 6112Thread sleep time: -99783s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 6112Thread sleep time: -40000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 5564Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 6828Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 6836Thread sleep count: 3877 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 6828Thread sleep count: 42 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exe TID: 6836Thread sleep count: 5920 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeThread delayed: delay time: 99783Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeThread delayed: delay time: 40000Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: W9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeCode function: 7_2_017011B0 LdrInitializeThunk,7_2_017011B0
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeMemory written: C:\Users\user\Desktop\W9YDH79i8G.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\KcsilHD' /XML 'C:\Users\user\AppData\Local\Temp\tmp4276.tmp'Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeProcess created: C:\Users\user\Desktop\W9YDH79i8G.exe C:\Users\user\Desktop\W9YDH79i8G.exeJump to behavior
                      Source: W9YDH79i8G.exe, 00000007.00000002.497128038.0000000001C70000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
                      Source: W9YDH79i8G.exe, 00000007.00000002.497128038.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: W9YDH79i8G.exe, 00000007.00000002.497128038.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: W9YDH79i8G.exe, 00000007.00000002.497128038.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Users\user\Desktop\W9YDH79i8G.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Users\user\Desktop\W9YDH79i8G.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.W9YDH79i8G.exe.400000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.497673320.0000000003286000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.497762134.00000000032B3000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: W9YDH79i8G.exe PID: 5656, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: W9YDH79i8G.exe PID: 6316, type: MEMORY
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.W9YDH79i8G.exe.400000.0.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\W9YDH79i8G.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: W9YDH79i8G.exe PID: 6316, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.W9YDH79i8G.exe.400000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.497673320.0000000003286000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.497762134.00000000032B3000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: W9YDH79i8G.exe PID: 5656, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: W9YDH79i8G.exe PID: 6316, type: MEMORY
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.W9YDH79i8G.exe.4428d80.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.W9YDH79i8G.exe.400000.0.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Input Capture21System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery321Distributed Component Object ModelInput Capture21Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 412503 Sample: W9YDH79i8G.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Multi AV Scanner detection for dropped file 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 7 other signatures 2->39 7 W9YDH79i8G.exe 7 2->7         started        process3 file4 23 C:\Users\user\AppData\Roaming\KcsilHD.exe, PE32 7->23 dropped 25 C:\Users\user\...\KcsilHD.exe:Zone.Identifier, ASCII 7->25 dropped 27 C:\Users\user\AppData\Local\...\tmp4276.tmp, XML 7->27 dropped 29 C:\Users\user\AppData\...\W9YDH79i8G.exe.log, ASCII 7->29 dropped 41 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->41 43 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->43 45 Contains functionality to register a low level keyboard hook 7->45 47 2 other signatures 7->47 11 W9YDH79i8G.exe 2 7->11         started        15 schtasks.exe 1 7->15         started        17 W9YDH79i8G.exe 7->17         started        19 2 other processes 7->19 signatures5 process6 dnsIp7 31 mail.privateemail.com 198.54.122.60, 49736, 587 NAMECHEAP-NETUS United States 11->31 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->49 51 Tries to steal Mail credentials (via file access) 11->51 53 Tries to harvest and steal ftp login credentials 11->53 55 2 other signatures 11->55 21 conhost.exe 15->21         started        signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      W9YDH79i8G.exe35%VirustotalBrowse
                      W9YDH79i8G.exe40%ReversingLabsWin32.Trojan.AgentTesla
                      W9YDH79i8G.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\KcsilHD.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\KcsilHD.exe40%ReversingLabsWin32.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      7.2.W9YDH79i8G.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://HVIItO.com0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://3yctoQGYo4sp.com0%Avira URL Cloudsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.privateemail.com
                      198.54.122.60
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1W9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://HVIItO.comW9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://DynDns.comDynDNSW9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://3yctoQGYo4sp.comW9YDH79i8G.exe, 00000007.00000002.497762134.00000000032B3000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.sectigo.com0W9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://mail.privateemail.comW9YDH79i8G.exe, 00000007.00000002.497963649.0000000003314000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haW9YDH79i8G.exe, 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameW9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipW9YDH79i8G.exe, 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, W9YDH79i8G.exe, 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssW9YDH79i8G.exe, 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmpfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              198.54.122.60
                              mail.privateemail.comUnited States
                              22612NAMECHEAP-NETUSfalse

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:412503
                              Start date:12.05.2021
                              Start time:18:32:56
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 3s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:W9YDH79i8G.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:32
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@12/4@1/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 6.5% (good quality ratio 5.5%)
                              • Quality average: 68.3%
                              • Quality standard deviation: 33.9%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 87
                              • Number of non-executed functions: 7
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 20.82.210.154, 168.61.161.212, 104.43.139.144, 92.122.145.220, 52.147.198.201, 104.43.193.48, 184.30.24.56, 20.82.209.183, 92.122.213.247, 92.122.213.194, 13.107.4.50, 2.20.143.16, 2.20.142.209, 20.50.102.62, 52.155.217.156, 20.54.26.129
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, Edge-Prod-FRA.env.au.au-msedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, elasticShed.au.au-msedge.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, c-0001.c-msedge.net, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, afdap.au.au-msedge.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, au.au-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, au.c-0001.c-msedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              18:33:47API Interceptor716x Sleep call for process: W9YDH79i8G.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              198.54.122.60Ko4zQgTBHv.exeGet hashmaliciousBrowse
                                wed.docGet hashmaliciousBrowse
                                  ORDER CONFIRMATION.docGet hashmaliciousBrowse
                                    SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                                      6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                                        RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                                          337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                                            vy38Kw9qRh.exeGet hashmaliciousBrowse
                                              ePj6KfzLBxh4vbe.exeGet hashmaliciousBrowse
                                                zkXpISzeo3.exeGet hashmaliciousBrowse
                                                  yl9KgwwOXDZoGMw.exeGet hashmaliciousBrowse
                                                    8DL3LHg4SB6Q7z2.exeGet hashmaliciousBrowse
                                                      01217a79_by_Libranalysis.exeGet hashmaliciousBrowse
                                                        5iRqi4LmLF.exeGet hashmaliciousBrowse
                                                          6f37L7HNqo.exeGet hashmaliciousBrowse
                                                            IqRG5ZzYOH.exeGet hashmaliciousBrowse
                                                              PO 4302003683.docGet hashmaliciousBrowse
                                                                Tender Overview 10052021.docGet hashmaliciousBrowse
                                                                  ORDER 10.05.docGet hashmaliciousBrowse
                                                                    purchase request.docGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      mail.privateemail.comKo4zQgTBHv.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      wed.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      ORDER CONFIRMATION.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      vy38Kw9qRh.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      ePj6KfzLBxh4vbe.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      zkXpISzeo3.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      yl9KgwwOXDZoGMw.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      8DL3LHg4SB6Q7z2.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      01217a79_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      5iRqi4LmLF.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      6f37L7HNqo.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      IqRG5ZzYOH.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      PO 4302003683.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      Tender Overview 10052021.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      ORDER 10.05.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      purchase request.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      NAMECHEAP-NETUSKo4zQgTBHv.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      Purchase Order.exeGet hashmaliciousBrowse
                                                                      • 198.54.126.165
                                                                      wed.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      ORDER CONFIRMATION.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                                                                      • 198.54.117.216
                                                                      main_setup_x86x64.exeGet hashmaliciousBrowse
                                                                      • 162.255.119.164
                                                                      00098765123POIIU.exeGet hashmaliciousBrowse
                                                                      • 199.192.23.253
                                                                      e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                                                                      • 185.61.154.27
                                                                      2021_May_Quotation_pdf.exeGet hashmaliciousBrowse
                                                                      • 198.54.115.133
                                                                      337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60
                                                                      Citvonvhciktufwvyzyhistnewdjgsoqdr.exeGet hashmaliciousBrowse
                                                                      • 198.54.117.212
                                                                      Updated Order list -804333.exeGet hashmaliciousBrowse
                                                                      • 198.54.115.56
                                                                      NAVTECO_R1_10_05_2021,pdf.exeGet hashmaliciousBrowse
                                                                      • 198.54.117.212
                                                                      BELLOW FABRICATION Dwg.exeGet hashmaliciousBrowse
                                                                      • 199.188.200.15
                                                                      file.exeGet hashmaliciousBrowse
                                                                      • 198.54.115.133
                                                                      scan of document 5336227.xlsmGet hashmaliciousBrowse
                                                                      • 162.0.233.152
                                                                      vy38Kw9qRh.exeGet hashmaliciousBrowse
                                                                      • 198.54.122.60

                                                                      JA3 Fingerprints

                                                                      No context

                                                                      Dropped Files

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      C:\Users\user\AppData\Roaming\KcsilHD.exeORDER CONFIRMATION.docGet hashmaliciousBrowse

                                                                        Created / dropped Files

                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\W9YDH79i8G.exe.log
                                                                        Process:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):1216
                                                                        Entropy (8bit):5.355304211458859
                                                                        Encrypted:false
                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                        Malicious:true
                                                                        Reputation:high, very likely benign file
                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                        C:\Users\user\AppData\Local\Temp\tmp4276.tmp
                                                                        Process:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1656
                                                                        Entropy (8bit):5.167020690421923
                                                                        Encrypted:false
                                                                        SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3U
                                                                        MD5:AF08A3DA8E0E3155FF47F61E57B341B6
                                                                        SHA1:5348054A4725F8F5E7605998FFE8F700D1765F54
                                                                        SHA-256:42D91FCF4B78A320EB132A20C82AD4D51EE2FEC556E836D41473BB1AAEF5DB6A
                                                                        SHA-512:5EA07A7C08C1515CB655F2C21572F82F63F1065A27C7E8C9B5BEC29C4D1CDE2D99D2CDF432E2158EC89BC1F191BBB294F0B3C6DC0CD417F91E54CC29B29EE5B5
                                                                        Malicious:true
                                                                        Reputation:low
                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                                        C:\Users\user\AppData\Roaming\KcsilHD.exe
                                                                        Process:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):846336
                                                                        Entropy (8bit):7.9780435401207574
                                                                        Encrypted:false
                                                                        SSDEEP:24576:imn4+yPg0Ip0DImJyhjDDRPm7C56SOyFhLlSb2:irZP5IaHkR+7C5iyFhLl0
                                                                        MD5:CDEBC3E47DB1DBEAC624DD329C1A9AE1
                                                                        SHA1:CEEE8FF397069A606B3BBEF0D54A4175A1DE9A0E
                                                                        SHA-256:0FA77EE6AF812F5513BF0AE73A02143A4ED3A037E884AECCC57576F460A9EA57
                                                                        SHA-512:A6397B1517BD85F13395B874188BB93D46C2E77DA9C054DC1F762441BA292D6CD54F9711CAE28A513B8AB58E4111C376724400E7A424AA12822D90032B38648A
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: ReversingLabs, Detection: 40%
                                                                        Joe Sandbox View:
                                                                        • Filename: ORDER CONFIRMATION.doc, Detection: malicious, Browse
                                                                        Reputation:low
                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`..............P.............J.... ........@.. .......................@............@.....................................O.......p.................... ....................................................... ............... ..H............text...X.... ...................... ..`.rsrc...p...........................@..@.reloc....... ......................@..B................,.......H.......@A...R....../........i............................................(....*.0............(......o....o......,...(....(.........s....o ...(......(!.....,L....s"......o#...($.......U...(.......(......(.....io%...&....,..o&......+.....U...(......*........L.3........0..Q.........(.........,A.(!...,..+....,..('.......((...s)......(....o*........,..o&.......*.........3..B.......0..!.........u.........,...t....Q..+....+..*....0..@........r...p.(.....(.....i...(+....(....-.~,..
                                                                        C:\Users\user\AppData\Roaming\KcsilHD.exe:Zone.Identifier
                                                                        Process:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):26
                                                                        Entropy (8bit):3.95006375643621
                                                                        Encrypted:false
                                                                        SSDEEP:3:ggPYV:rPYV
                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                        Malicious:true
                                                                        Preview: [ZoneTransfer]....ZoneId=0

                                                                        Static File Info

                                                                        General

                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):7.9780435401207574
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        File name:W9YDH79i8G.exe
                                                                        File size:846336
                                                                        MD5:cdebc3e47db1dbeac624dd329c1a9ae1
                                                                        SHA1:ceee8ff397069a606b3bbef0d54a4175a1de9a0e
                                                                        SHA256:0fa77ee6af812f5513bf0ae73a02143a4ed3a037e884aeccc57576f460a9ea57
                                                                        SHA512:a6397b1517bd85f13395b874188bb93d46c2e77da9c054dc1f762441ba292d6cd54f9711cae28a513b8ab58e4111c376724400e7a424aa12822d90032b38648a
                                                                        SSDEEP:24576:imn4+yPg0Ip0DImJyhjDDRPm7C56SOyFhLlSb2:irZP5IaHkR+7C5iyFhLl0
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............J.... ........@.. .......................@............@................................

                                                                        File Icon

                                                                        Icon Hash:00828e8e8686b000

                                                                        Static PE Info

                                                                        General

                                                                        Entrypoint:0x4cfd4a
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                        Time Stamp:0x609AF3E2 [Tue May 11 21:15:14 2021 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:v4.0.30319
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                        Entrypoint Preview

                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        add byte ptr [eax], al
                                                                        inc ebp
                                                                        dec edi
                                                                        push eax
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al

                                                                        Data Directories

                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xcfcf80x4f.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x670.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xd20000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                        Sections

                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000xcdd580xcde00False0.982190630692data7.98266183828IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0xd00000x6700x800False0.345703125data3.55057718956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0xd20000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                        Resources

                                                                        NameRVASizeTypeLanguageCountry
                                                                        RT_VERSION0xd00900x3e0data
                                                                        RT_MANIFEST0xd04800x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                        Imports

                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain

                                                                        Version Infos

                                                                        DescriptionData
                                                                        Translation0x0000 0x04b0
                                                                        LegalCopyrightCopyright Barret 2017 - 2021
                                                                        Assembly Version1.0.0.0
                                                                        InternalNameAsyncCausalityTracer.exe
                                                                        FileVersion1.0.0.0
                                                                        CompanyName
                                                                        LegalTrademarks
                                                                        CommentsSettings for TCP connections
                                                                        ProductNameFramework - TCP Protocol
                                                                        ProductVersion1.0.0.0
                                                                        FileDescriptionFramework - TCP Protocol
                                                                        OriginalFilenameAsyncCausalityTracer.exe

                                                                        Network Behavior

                                                                        Network Port Distribution

                                                                        TCP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        May 12, 2021 18:35:29.670989990 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:29.865370035 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:29.867326021 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:30.099402905 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.099864960 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:30.293721914 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.294054985 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.294796944 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:30.488758087 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.533360958 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:30.729345083 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.730861902 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.730899096 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.730920076 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.730942965 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.731009007 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:30.771229029 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:30.966413975 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:30.967308998 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.012789965 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:31.056408882 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:31.252953053 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.252980947 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.262046099 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:31.455735922 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.456871033 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.457626104 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:31.652164936 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.654834032 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.655723095 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:31.849677086 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.852600098 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:31.853085041 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:32.047009945 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:32.086910963 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:32.087454081 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:32.281621933 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:32.282399893 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:32.287432909 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:32.287549973 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:32.287616968 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:32.287689924 CEST49736587192.168.2.7198.54.122.60
                                                                        May 12, 2021 18:35:32.481466055 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:32.570746899 CEST58749736198.54.122.60192.168.2.7
                                                                        May 12, 2021 18:35:32.622329950 CEST49736587192.168.2.7198.54.122.60

                                                                        UDP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        May 12, 2021 18:33:38.219392061 CEST6245253192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:38.278716087 CEST53624528.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:38.310179949 CEST5782053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:38.372602940 CEST53578208.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:38.889776945 CEST5084853192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:38.938575029 CEST53508488.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:40.599807978 CEST6124253192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:40.652945042 CEST53612428.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:41.375370026 CEST5856253192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:41.435806990 CEST53585628.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:41.682656050 CEST5659053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:41.733218908 CEST53565908.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:42.993810892 CEST6050153192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:43.054022074 CEST53605018.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:44.013274908 CEST5377553192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:44.065963984 CEST53537758.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:44.978102922 CEST5183753192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:45.029982090 CEST53518378.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:46.354953051 CEST5541153192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:46.405982971 CEST53554118.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:47.701719046 CEST6366853192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:47.750437021 CEST53636688.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:49.096115112 CEST5464053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:49.144995928 CEST53546408.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:51.494324923 CEST5873953192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:51.546130896 CEST53587398.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:53.428333998 CEST6033853192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:53.478770018 CEST53603388.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:54.205084085 CEST5871753192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:54.253799915 CEST53587178.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:55.399101019 CEST5976253192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:55.450783968 CEST53597628.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:57.007155895 CEST5432953192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:57.056205988 CEST53543298.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:57.853051901 CEST5805253192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:57.904751062 CEST53580528.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:58.752854109 CEST5400853192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:58.801477909 CEST53540088.8.8.8192.168.2.7
                                                                        May 12, 2021 18:33:59.546153069 CEST5945153192.168.2.78.8.8.8
                                                                        May 12, 2021 18:33:59.594888926 CEST53594518.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:01.312114954 CEST5291453192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:01.360932112 CEST53529148.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:03.235868931 CEST6456953192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:03.297327995 CEST53645698.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:03.376880884 CEST5281653192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:03.425638914 CEST53528168.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:04.312475920 CEST5078153192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:04.361272097 CEST53507818.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:05.374078989 CEST5423053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:05.422889948 CEST53542308.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:16.277774096 CEST5491153192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:16.346321106 CEST53549118.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:27.371154070 CEST4995853192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:27.430054903 CEST53499588.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:33.539928913 CEST5086053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:33.588852882 CEST53508608.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:33.686065912 CEST5045253192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:33.743349075 CEST53504528.8.8.8192.168.2.7
                                                                        May 12, 2021 18:34:58.687050104 CEST5973053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:34:58.746838093 CEST53597308.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:02.738291979 CEST5931053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:02.801356077 CEST53593108.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:23.399950981 CEST5191953192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:23.548990965 CEST53519198.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:24.151328087 CEST6429653192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:24.210515976 CEST53642968.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:24.819634914 CEST5668053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:24.876698017 CEST53566808.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:25.079459906 CEST5882053192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:25.157521963 CEST53588208.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:25.492592096 CEST6098353192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:25.617566109 CEST53609838.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:26.262207985 CEST4924753192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:26.319638968 CEST53492478.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:26.979278088 CEST5228653192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:27.039125919 CEST53522868.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:27.696122885 CEST5606453192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:27.754156113 CEST53560648.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:28.996915102 CEST6374453192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:29.056936979 CEST53637448.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:29.559542894 CEST6145753192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:29.616543055 CEST53614578.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:30.227416992 CEST5836753192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:30.292738914 CEST53583678.8.8.8192.168.2.7
                                                                        May 12, 2021 18:35:30.789813042 CEST6059953192.168.2.78.8.8.8
                                                                        May 12, 2021 18:35:30.840092897 CEST53605998.8.8.8192.168.2.7

                                                                        DNS Queries

                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                        May 12, 2021 18:35:29.559542894 CEST192.168.2.78.8.8.80x264aStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)

                                                                        DNS Answers

                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                        May 12, 2021 18:35:29.616543055 CEST8.8.8.8192.168.2.70x264aNo error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)

                                                                        SMTP Packets

                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                        May 12, 2021 18:35:30.099402905 CEST58749736198.54.122.60192.168.2.7220 PrivateEmail.com Mail Node
                                                                        May 12, 2021 18:35:30.099864960 CEST49736587192.168.2.7198.54.122.60EHLO 899552
                                                                        May 12, 2021 18:35:30.294054985 CEST58749736198.54.122.60192.168.2.7250-MTA-09.privateemail.com
                                                                        250-PIPELINING
                                                                        250-SIZE 81788928
                                                                        250-ETRN
                                                                        250-AUTH PLAIN LOGIN
                                                                        250-ENHANCEDSTATUSCODES
                                                                        250-8BITMIME
                                                                        250 STARTTLS
                                                                        May 12, 2021 18:35:30.294796944 CEST49736587192.168.2.7198.54.122.60STARTTLS
                                                                        May 12, 2021 18:35:30.488758087 CEST58749736198.54.122.60192.168.2.7220 Ready to start TLS

                                                                        Code Manipulations

                                                                        Statistics

                                                                        CPU Usage

                                                                        Click to jump to process

                                                                        Memory Usage

                                                                        Click to jump to process

                                                                        High Level Behavior Distribution

                                                                        Click to dive into process behavior distribution

                                                                        Behavior

                                                                        Click to jump to process

                                                                        System Behavior

                                                                        General

                                                                        Start time:18:33:45
                                                                        Start date:12/05/2021
                                                                        Path:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\Desktop\W9YDH79i8G.exe'
                                                                        Imagebase:0xf00000
                                                                        File size:846336 bytes
                                                                        MD5 hash:CDEBC3E47DB1DBEAC624DD329C1A9AE1
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.252742797.0000000003334000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.254574303.00000000042F9000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.254886399.0000000004412000.00000004.00000001.sdmp, Author: Joe Security
                                                                        Reputation:low

                                                                        General

                                                                        Start time:18:33:51
                                                                        Start date:12/05/2021
                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\KcsilHD' /XML 'C:\Users\user\AppData\Local\Temp\tmp4276.tmp'
                                                                        Imagebase:0xb80000
                                                                        File size:185856 bytes
                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:18:33:52
                                                                        Start date:12/05/2021
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff774ee0000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:18:33:53
                                                                        Start date:12/05/2021
                                                                        Path:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Imagebase:0x240000
                                                                        File size:846336 bytes
                                                                        MD5 hash:CDEBC3E47DB1DBEAC624DD329C1A9AE1
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low

                                                                        General

                                                                        Start time:18:33:54
                                                                        Start date:12/05/2021
                                                                        Path:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Imagebase:0x320000
                                                                        File size:846336 bytes
                                                                        MD5 hash:CDEBC3E47DB1DBEAC624DD329C1A9AE1
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low

                                                                        General

                                                                        Start time:18:33:54
                                                                        Start date:12/05/2021
                                                                        Path:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Imagebase:0x140000
                                                                        File size:846336 bytes
                                                                        MD5 hash:CDEBC3E47DB1DBEAC624DD329C1A9AE1
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low

                                                                        General

                                                                        Start time:18:33:55
                                                                        Start date:12/05/2021
                                                                        Path:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Users\user\Desktop\W9YDH79i8G.exe
                                                                        Imagebase:0xf20000
                                                                        File size:846336 bytes
                                                                        MD5 hash:CDEBC3E47DB1DBEAC624DD329C1A9AE1
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.497630354.0000000003251000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.494321847.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.497673320.0000000003286000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.497762134.00000000032B3000.00000004.00000001.sdmp, Author: Joe Security
                                                                        Reputation:low

                                                                        Disassembly

                                                                        Code Analysis

                                                                        Reset < >

                                                                          Executed Functions

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: GQ[$b46r
                                                                          • API String ID: 0-3196810998
                                                                          • Opcode ID: 259a7be1091b4b9379c7be0ba59334db5ace986a7c499f34381e73515bf88f90
                                                                          • Instruction ID: 81354c90bb0c1828951c75de20aa62e8c5539c97d5a997a07bda106d008bae59
                                                                          • Opcode Fuzzy Hash: 259a7be1091b4b9379c7be0ba59334db5ace986a7c499f34381e73515bf88f90
                                                                          • Instruction Fuzzy Hash: 0591F674E15249CFCB05DFEAD5855AEFBB2EF89700F20942AD425BB314D734AA028F94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: GQ[$b46r
                                                                          • API String ID: 0-3196810998
                                                                          • Opcode ID: 506eb2feb141cc934c2ababe6379d51b41ffe171e3545c481baf23aefc19ef40
                                                                          • Instruction ID: 1f87a84a606716fa2c4f3d883923075dee3c3dc3e1be4d3ffda3d296e8a08a8e
                                                                          • Opcode Fuzzy Hash: 506eb2feb141cc934c2ababe6379d51b41ffe171e3545c481baf23aefc19ef40
                                                                          • Instruction Fuzzy Hash: ED91F575E15249CFCB05CFEAD5855AEBBF2EF89700F20942AD425BB314E734AA028F54
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8T$8T
                                                                          • API String ID: 0-3743047583
                                                                          • Opcode ID: c63ae783e8cd453e593d3e43ca0b54e20b96ee880bf075f76e3bcfa9d15d4be6
                                                                          • Instruction ID: 41ce70f8e66a816770a25ab00c7235de8f2fc97e0ab86d246f67e4523bcd6fb8
                                                                          • Opcode Fuzzy Hash: c63ae783e8cd453e593d3e43ca0b54e20b96ee880bf075f76e3bcfa9d15d4be6
                                                                          • Instruction Fuzzy Hash: 02616B70D29208DFCB14CFE6D5845AEFBB2FB99314F10A519E026BB204E7349942CF24
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Zl_O
                                                                          • API String ID: 0-528031492
                                                                          • Opcode ID: e98b8c84dc9e806036f8a91a8ca30ce3a9a113c2e4ebe7edde7ed655b1f9799d
                                                                          • Instruction ID: ca65481cd1426ff0224d722ceb962c6ce5ecefc40ed370a828db7ebb450b2034
                                                                          • Opcode Fuzzy Hash: e98b8c84dc9e806036f8a91a8ca30ce3a9a113c2e4ebe7edde7ed655b1f9799d
                                                                          • Instruction Fuzzy Hash: D1416A74E15208DBCB08CFA5D9456EEBBF2FF8D200F14942AE426B7314DB3499118B24
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Zl_O
                                                                          • API String ID: 0-528031492
                                                                          • Opcode ID: 7edde2823a0eb3ec547694b6a99e4e03f160ccf67745e53bd9f22dacd1680de1
                                                                          • Instruction ID: e12b3edf474b39cf29a57042d0764a8bf5099f8c225683d295272ec6ccbb906b
                                                                          • Opcode Fuzzy Hash: 7edde2823a0eb3ec547694b6a99e4e03f160ccf67745e53bd9f22dacd1680de1
                                                                          • Instruction Fuzzy Hash: A1415B70E26218DBCB08CFA6D9456EEBBF2FFCD600F149429E426B7214DB3499118B64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 97a89b00d2b08a996b2852df7477768ebbcdadd7d7a07835e10e4d9baa54c735
                                                                          • Instruction ID: f9aa083ffcdf5a9fec0ad11c5d85865dbd42be3cf4039ce4a9aea6b9f5a18e9b
                                                                          • Opcode Fuzzy Hash: 97a89b00d2b08a996b2852df7477768ebbcdadd7d7a07835e10e4d9baa54c735
                                                                          • Instruction Fuzzy Hash: A0D12874E11208DFDB04CFA5D985B9DFBB6FB89700F209429E41ABB394DB75A901CB24
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 43ae26e18213cd285da7ad00a2f32d1fd37505684f0a38ab3eb0929910fbfa40
                                                                          • Instruction ID: a9d8117b15fe861988d34230aad53333e57a931fcfc2da90db08f6bc010b4ce6
                                                                          • Opcode Fuzzy Hash: 43ae26e18213cd285da7ad00a2f32d1fd37505684f0a38ab3eb0929910fbfa40
                                                                          • Instruction Fuzzy Hash: 10D11774E16208DFDB04CFA5D941B9DFBB6FB89700F209429E41ABB394DB74A901CB24
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7b815d6ab7d7b71fa95cb30e772d73b2d5b2a6d6b2f5238d830f382262aaf710
                                                                          • Instruction ID: 8f58fc9d41bf3da75c24fe52976521b48830ba3a368d2377a2e53e18b11b07d6
                                                                          • Opcode Fuzzy Hash: 7b815d6ab7d7b71fa95cb30e772d73b2d5b2a6d6b2f5238d830f382262aaf710
                                                                          • Instruction Fuzzy Hash: E7810674E11218DFDB08DFE5D8556AEBBB6FF89300F20856AE41AAB354DB349902CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 25dea794f3f560a160ba00fced4ce8e8feb7d6d2b98b29022a267b7804545cc6
                                                                          • Instruction ID: 525261c686766fa7e501582b951210a7fbb1f50b029f6c118bf48faa8975bff8
                                                                          • Opcode Fuzzy Hash: 25dea794f3f560a160ba00fced4ce8e8feb7d6d2b98b29022a267b7804545cc6
                                                                          • Instruction Fuzzy Hash: B7810574E11218DFDB08DFE5D8555AEBBB6FF89300F20856AE42AAB354DB349902CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 85be59bb12d3395872df1bc751bda1a71d8c59a355b0ae2c88e1d8cd02744a7a
                                                                          • Instruction ID: 59ad535179c9792b67b8bcdc8a7d3e3afa3ff9679680344e7e7270145026b241
                                                                          • Opcode Fuzzy Hash: 85be59bb12d3395872df1bc751bda1a71d8c59a355b0ae2c88e1d8cd02744a7a
                                                                          • Instruction Fuzzy Hash: 79319E30E25118DFCF08CFA5D9445EDBBF6EB8D300F18952AD016B7354D73499118B28
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b644fac0f5d2fcf378e730edefc31b670d3befff35b82a61eedbf4e456557094
                                                                          • Instruction ID: 223bf132b6a01ec06c69579dbadd348d17f7c9f3611070689e25c7e58cfecc35
                                                                          • Opcode Fuzzy Hash: b644fac0f5d2fcf378e730edefc31b670d3befff35b82a61eedbf4e456557094
                                                                          • Instruction Fuzzy Hash: 04317E70E25118DFCB08CFAAD9445EDBBF6EB8D300F18A52AD426B7354DB3499118B28
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8aa63a46a46b48df68f3f7a2fb74729344d1dfb35eba8baff775455bcc3bdc39
                                                                          • Instruction ID: f0c4d7781b4fc06af9d11329850fe0753ad12be4a98cd7c5e0775ca69e8a1576
                                                                          • Opcode Fuzzy Hash: 8aa63a46a46b48df68f3f7a2fb74729344d1dfb35eba8baff775455bcc3bdc39
                                                                          • Instruction Fuzzy Hash: BD117C71C25258CBCB148FA5D809BEEBBF0BB0E325F149579E461B3280C7788A44CB79
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9cd4648ecd18587f77b6608ff25496bc752de8f38a4ba51d8b3e0f0fd45df04a
                                                                          • Instruction ID: ad2e4ae13ad22ab92303512e4174e1cacfa915e0e3c349b029883e4e878a31a4
                                                                          • Opcode Fuzzy Hash: 9cd4648ecd18587f77b6608ff25496bc752de8f38a4ba51d8b3e0f0fd45df04a
                                                                          • Instruction Fuzzy Hash: 53112730D25258CBDB14CFA6C418BEEBAF1BB4E325F14907AD425B3290C7788A44CB79
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e68b5029e1049465d35a1c65660752b629f0743f66e5ff66cbdb434f07250bc8
                                                                          • Instruction ID: 858d3211fc4c5bcbc6381291ba234b2888dfc5d97b1b35f0ecbba3e9ed8df54b
                                                                          • Opcode Fuzzy Hash: e68b5029e1049465d35a1c65660752b629f0743f66e5ff66cbdb434f07250bc8
                                                                          • Instruction Fuzzy Hash: 07E068A28BD295CBC3008FE08C585BAFF70FB27241F1450AAD071F3192C7688101D771
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0BCE05BE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 6d06b379059f708aafd5738bccd6c861de42198290e5be70bae6922931e9d204
                                                                          • Instruction ID: f57d005a14da2efa83354b36aed9c5edb58403e260bdd348da0fd39f796b4b1d
                                                                          • Opcode Fuzzy Hash: 6d06b379059f708aafd5738bccd6c861de42198290e5be70bae6922931e9d204
                                                                          • Instruction Fuzzy Hash: 0A915E71D11219CFDF10CFA4C9827EEBBB2BF44314F058569E869A7240DB749A85CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0BCE05BE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: ba7f2bef6a4346c22fdd3a654de2e6ecfac66ccd09c007bf878b6a79ccdb9666
                                                                          • Instruction ID: f0cd177d576f199ee6b0930c9827a00f6864c2dcf396c511040c6b0dad2d67dc
                                                                          • Opcode Fuzzy Hash: ba7f2bef6a4346c22fdd3a654de2e6ecfac66ccd09c007bf878b6a79ccdb9666
                                                                          • Instruction Fuzzy Hash: 1F915F71D11219CFDF10CFA4C9827EEBBB2BF44314F058569D869A7240DB749A85CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0BCE00AE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: e2a0529eef78ee9765581ee88b82fe77f5b50590e21e3be04f554243082e6bab
                                                                          • Instruction ID: ec28d4a382753115a9dc1b68d081564ed9a67f6d4d73f49bf2054e381fe71403
                                                                          • Opcode Fuzzy Hash: e2a0529eef78ee9765581ee88b82fe77f5b50590e21e3be04f554243082e6bab
                                                                          • Instruction Fuzzy Hash: A021BC718083898FCB11CFA5C891BDEBFF1EF4A328F14885AD555AB251C779A805CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0BCE0190
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 0f097e3e9d10eddbdfda4ae86841e0b890dc67632b113c1fdb4eae0aa673271e
                                                                          • Instruction ID: 582b4af0e042edc3db20fbe0654f3ba5d5bd63fdac52dfff59640b50f1c17b05
                                                                          • Opcode Fuzzy Hash: 0f097e3e9d10eddbdfda4ae86841e0b890dc67632b113c1fdb4eae0aa673271e
                                                                          • Instruction Fuzzy Hash: 0F2157B19003499FCF10CFA9C885BEEBBF5FF48314F048829E919A7240C778A944CBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0BCE0190
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 7a014464985cbe6421194774ea12fb7e9cce86ad13fda4cb652b02ac2d0a0367
                                                                          • Instruction ID: 8215f324db7718d5266279b2ca72762e407d2839bf442faae74d49b993cb33bc
                                                                          • Opcode Fuzzy Hash: 7a014464985cbe6421194774ea12fb7e9cce86ad13fda4cb652b02ac2d0a0367
                                                                          • Instruction Fuzzy Hash: 6D2125B19003599FCF10CFA9C885BEEBBF5FF48314F04882AE958A7240D7789954CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0BCE0270
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 37049f098ba3de96634a4c6a8e8c507df49751504163c400ca3f6a0b08af3ab2
                                                                          • Instruction ID: 3994d749348ea891e1ee217c941bbaf883704000366f58e5262fc789a2d1bba4
                                                                          • Opcode Fuzzy Hash: 37049f098ba3de96634a4c6a8e8c507df49751504163c400ca3f6a0b08af3ab2
                                                                          • Instruction Fuzzy Hash: 582116B18003599FCF10CFAAC885BEEBBF5FF48314F548429E919A7240C7789944CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0BCE0270
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: c0dae2bf7635da335671def24d6455d78732b4438f3d28f116cd118c94e9ccc6
                                                                          • Instruction ID: 0df4013c7984246ebfe5a1a3edc65b3b88415ac9104fd263eb232ba0c8f75a04
                                                                          • Opcode Fuzzy Hash: c0dae2bf7635da335671def24d6455d78732b4438f3d28f116cd118c94e9ccc6
                                                                          • Instruction Fuzzy Hash: 9A2116B18002599FCB10CFAAC885AEEBBF5FF48314F548429E518A7240C7789944CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0BCE00AE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 9d45cc78694d8b1b1bf02f782fe839f0811932dee42f0b0af74243b46fc6d07f
                                                                          • Instruction ID: 42488cf4dc5f93671d0eb9e5a999c56815d5178ec2c801ee92194e79fb8e2018
                                                                          • Opcode Fuzzy Hash: 9d45cc78694d8b1b1bf02f782fe839f0811932dee42f0b0af74243b46fc6d07f
                                                                          • Instruction Fuzzy Hash: C41137719002489FCF10CFAAC845BDFBBF5EF48324F148819E515A7250C775A954CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0BCE5725
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: MessagePost
                                                                          • String ID:
                                                                          • API String ID: 410705778-0
                                                                          • Opcode ID: 12dfb92578e6d05e6741ff315cb014023b9b733d6d346061efd3151c2456da62
                                                                          • Instruction ID: 29a5186191636a64a1fe89c36b1ee7381080ef15822bbfe89c1a0776372b7917
                                                                          • Opcode Fuzzy Hash: 12dfb92578e6d05e6741ff315cb014023b9b733d6d346061efd3151c2456da62
                                                                          • Instruction Fuzzy Hash: 5A11F2B5810348DFCB10CF9AD989BDEBBF8EB58324F148459E528A7200C374A954CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0BCE5725
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: MessagePost
                                                                          • String ID:
                                                                          • API String ID: 410705778-0
                                                                          • Opcode ID: 6e84597e93ba545f1bc0bdd507c806cdbc7ff2e797809aacefd65230db988fc2
                                                                          • Instruction ID: 2918dbd7e8dbfe56665aa0ac55b4b3081808ba30120ca0230bcd656629460ad7
                                                                          • Opcode Fuzzy Hash: 6e84597e93ba545f1bc0bdd507c806cdbc7ff2e797809aacefd65230db988fc2
                                                                          • Instruction Fuzzy Hash: F311F2B5810249DFDB10CF9AD989BDEBBF8EB58328F148859E418B7200C374A944CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.252364763.000000000178D000.00000040.00000001.sdmp, Offset: 0178D000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a265790dc6d378693ad41a73037aa2d8fc923278cda4b69bb9eb971c140b3e77
                                                                          • Instruction ID: 79e7466a5546337cf7389900e104494a757545cc3a5d5bd182fe021dbe2c42fb
                                                                          • Opcode Fuzzy Hash: a265790dc6d378693ad41a73037aa2d8fc923278cda4b69bb9eb971c140b3e77
                                                                          • Instruction Fuzzy Hash: D42138B1584200DFDB25EF94D4C0B16FF61FB84328F3485A9E9094B246C376D805CBB1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.252404514.000000000179D000.00000040.00000001.sdmp, Offset: 0179D000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bfe2a2e615ac284e7040892ee828f1eee2fd648e09f70829b411aeb2f48433c0
                                                                          • Instruction ID: 61bc19ac34400a679a67f196d08d58fff4bb3c0ae48316b6c31a1d1a6a99b520
                                                                          • Opcode Fuzzy Hash: bfe2a2e615ac284e7040892ee828f1eee2fd648e09f70829b411aeb2f48433c0
                                                                          • Instruction Fuzzy Hash: E52125B5504204DFDF25CFA8E4C4B16FB61FB88354F24C5A9E94A4B246C376D80ACA61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.252364763.000000000178D000.00000040.00000001.sdmp, Offset: 0178D000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c28d7f9b6c052c6bf27c54b29b78abe899c0e928c1954ef857855ef63c427eb8
                                                                          • Instruction ID: fc0412b00834bac317c5c4d012a7a1884a41943dffed316034c6639b541e4509
                                                                          • Opcode Fuzzy Hash: c28d7f9b6c052c6bf27c54b29b78abe899c0e928c1954ef857855ef63c427eb8
                                                                          • Instruction Fuzzy Hash: 3F11DFB6844280CFCB12DF44D5C4B16FF71FB84324F3882AAD8054B256C336D556CBA2
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.252404514.000000000179D000.00000040.00000001.sdmp, Offset: 0179D000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac1c577071c2d0f69f9c0c2e3af2bcc6dc79f4eb61d5675d3e9761bf736dafb1
                                                                          • Instruction ID: ad56cbc9a2c803ff8bc2dc4a54492575f2dc2cc77b2e78f3ddd5c83f419fd823
                                                                          • Opcode Fuzzy Hash: ac1c577071c2d0f69f9c0c2e3af2bcc6dc79f4eb61d5675d3e9761bf736dafb1
                                                                          • Instruction Fuzzy Hash: 9D118E75504280DFDB22CF58E5D4B15FB61FB48314F28C6A9D8494B656C33AD44ACBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.252364763.000000000178D000.00000040.00000001.sdmp, Offset: 0178D000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1d7c96d23750334b6aa5022be8b66852fc8f5ccebd3a36581597ad942e67b2fe
                                                                          • Instruction ID: 13c66d404834ef62bfaee4c587708e80e82f3ce0c1bc52ffe4c2a6a119e3990c
                                                                          • Opcode Fuzzy Hash: 1d7c96d23750334b6aa5022be8b66852fc8f5ccebd3a36581597ad942e67b2fe
                                                                          • Instruction Fuzzy Hash: 5401A771448384AAE7207A66CDC4766FB98EF81724F18C55AEE045A2C2C3799844D6B1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.252364763.000000000178D000.00000040.00000001.sdmp, Offset: 0178D000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d1edf8476694f43125d0b8b8839a6bd5844f46219df2962fabe50e4562b9a89e
                                                                          • Instruction ID: 325dd6dd3ba65fe66f1315207c671a8910eabdff5e4ca3db9d80d81aafdf5f15
                                                                          • Opcode Fuzzy Hash: d1edf8476694f43125d0b8b8839a6bd5844f46219df2962fabe50e4562b9a89e
                                                                          • Instruction Fuzzy Hash: B4F0F671404384AEE7209B1ACCC4B67FFE8EB81734F18C55AED085B282C3789844CBB1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Non-executed Functions

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Z=G$Z=G$Z=G$P
                                                                          • API String ID: 0-2054813298
                                                                          • Opcode ID: 76296b72c6697f344d365c1707e8acef32094f7aac8a4ca2858d22e3dfa9da55
                                                                          • Instruction ID: 7b7282d9aa8bb8779eb5252759b81859acaa1ccc73029fd14b175386bceca92c
                                                                          • Opcode Fuzzy Hash: 76296b72c6697f344d365c1707e8acef32094f7aac8a4ca2858d22e3dfa9da55
                                                                          • Instruction Fuzzy Hash: 06512B71D14669CBDB29CF66C8447AEFBB6BFC9301F14C1AAC41DA7214EB305A858F14
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Z=G$Z=G$Z=G$P
                                                                          • API String ID: 0-2054813298
                                                                          • Opcode ID: c06d0f080d47af09a6b26313b6b468a608835c4a939903b8e48cd222064121c3
                                                                          • Instruction ID: 0e99dfc034e47ec39e92a7c3be319f2a417ce418344df1bed56d3354a39f7206
                                                                          • Opcode Fuzzy Hash: c06d0f080d47af09a6b26313b6b468a608835c4a939903b8e48cd222064121c3
                                                                          • Instruction Fuzzy Hash: 08512871E1466ACBDB28CF66C84479EFBB6BFC9301F14C5AAC41DA7214EB305A858F14
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Z=G$Z=G$Z=G$P
                                                                          • API String ID: 0-2054813298
                                                                          • Opcode ID: c8a41616f453a7236629c19deabf52a591455a388f76d358bc99c6c0df6a668e
                                                                          • Instruction ID: 960b1569982c4b31ed7fab1897c3d1e900f74e4a97ee16e42762e85632335e27
                                                                          • Opcode Fuzzy Hash: c8a41616f453a7236629c19deabf52a591455a388f76d358bc99c6c0df6a668e
                                                                          • Instruction Fuzzy Hash: 5F512574E1466ACBCB64CF66C844BDDFBB2BF89301F1085EAD419A7200EB309A858F14
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Z=G$Z=G$Z=G$P
                                                                          • API String ID: 0-2054813298
                                                                          • Opcode ID: 15e6380e45a92cd9101131fd27e37ac17e3bd283369ff47a188af3de12e0d2d2
                                                                          • Instruction ID: 3c29678806af920358a76d159914c868b2dcec7e681991c9c9203787da99845e
                                                                          • Opcode Fuzzy Hash: 15e6380e45a92cd9101131fd27e37ac17e3bd283369ff47a188af3de12e0d2d2
                                                                          • Instruction Fuzzy Hash: BE5129B1D1466ACBDB24CF66C940BDDF7B6FB89301F1085EAC429A7200E7345AD58F24
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.251439775.0000000000F02000.00000002.00020000.sdmp, Offset: 00F00000, based on PE: true
                                                                          • Associated: 00000000.00000002.251429004.0000000000F00000.00000002.00020000.sdmp Download File
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ba9818b2ddb98142aa805eb33d62377772c7c6d037c8395c8425bf18698ccb93
                                                                          • Instruction ID: fd2f053997537290722bd3cfdbfe05283ec6000cb085a0810664549bc1262f2b
                                                                          • Opcode Fuzzy Hash: ba9818b2ddb98142aa805eb33d62377772c7c6d037c8395c8425bf18698ccb93
                                                                          • Instruction Fuzzy Hash: 9033466244F3C25FC7138B749CB5691BFB1AE5721471E09CBD4C0CF0A3E2196A6AE762
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9fb901819e95bb49ef8b94752cb6410ae886cdff7c35825c22d727d463370d1b
                                                                          • Instruction ID: 7e450e8ffbb8502ce7ffbe39c9e39984a90508ea970280fb6dd70fba2ba677e9
                                                                          • Opcode Fuzzy Hash: 9fb901819e95bb49ef8b94752cb6410ae886cdff7c35825c22d727d463370d1b
                                                                          • Instruction Fuzzy Hash: 594145B0D1521ACBDB14CFD6D94539EFBB2BB88304F109069C419BB298E7B94A49CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.259654623.000000000BCE0000.00000040.00000001.sdmp, Offset: 0BCE0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f22524789915e2b84e7b836aa428cc170797be8e210a74e8968d92e452595e13
                                                                          • Instruction ID: 50fa9d64d00bfcc3abf74b2e440558a30bcdacfd2b247d903ad51b2f8fa7c38c
                                                                          • Opcode Fuzzy Hash: f22524789915e2b84e7b836aa428cc170797be8e210a74e8968d92e452595e13
                                                                          • Instruction Fuzzy Hash: 9B4159B0D15219CBDB14CFD6C94679EFBF1BB88304F109069C415BB294D7B98A49CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Executed Functions

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 4cf4cf147f6de31d9fc6a4938b6e8aa4617032343823590e4ac41d93573ec33a
                                                                          • Instruction ID: 7a89057f22149a8b5ed62ccdf6fc7f7ae4ed035adcf7dd3ec7e53895d44c9c51
                                                                          • Opcode Fuzzy Hash: 4cf4cf147f6de31d9fc6a4938b6e8aa4617032343823590e4ac41d93573ec33a
                                                                          • Instruction Fuzzy Hash: 1D62F871E007198FDB25EF78C95469DB7F2AF89300F5085AAD50AAB354EF30AA85CF41
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.495371752.00000000014C0000.00000040.00000001.sdmp, Offset: 014C0000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f63ee4993dc0308cd915ce407086dab878145ce112b1f937a9f4056a30cf5b01
                                                                          • Instruction ID: 62a1f4acf172849c1e00ec64d42bc610093e160023f1795975d0bcb8e8444cc5
                                                                          • Opcode Fuzzy Hash: f63ee4993dc0308cd915ce407086dab878145ce112b1f937a9f4056a30cf5b01
                                                                          • Instruction Fuzzy Hash: 2FF13C38A00209CFDB54DFA9C894B9EBBF1BF88714F15856AE409AF365DB74A845CB40
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetWindowsHookExW.USER32(0000000D,00000000,?,?), ref: 01708C53
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: HookWindows
                                                                          • String ID:
                                                                          • API String ID: 2559412058-0
                                                                          • Opcode ID: a07749336450ed1957f262825addd3ba9b7a47b1cb5bc8351a5ddc964ca7e040
                                                                          • Instruction ID: 4da6a134389e9b28993dfd7a132283816ba283e928d02c1ba062742246080935
                                                                          • Opcode Fuzzy Hash: a07749336450ed1957f262825addd3ba9b7a47b1cb5bc8351a5ddc964ca7e040
                                                                          • Instruction Fuzzy Hash: A92134B5D042489FCB10CF9AC844BEEFBF4FB88314F148869E419A7280CB74A944CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: d71cbfb4d9efba42470724879b2ebd93005b937bc549a850dd86a8905f5bce4e
                                                                          • Instruction ID: 5f9e0cbcc812eb7f00a90a5ccf7f9b30c26bcb98e176d04fb2dda635aed4972f
                                                                          • Opcode Fuzzy Hash: d71cbfb4d9efba42470724879b2ebd93005b937bc549a850dd86a8905f5bce4e
                                                                          • Instruction Fuzzy Hash: 96922874A14228CFCB64EF24D85879DBBB6BF88205F5080EAE50AA3354DF359E85CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 0f4bd456ff895d9d9b0d35134a14c19471b6b00fdb09f0ce408e38df6822a28c
                                                                          • Instruction ID: 9a411bcd607b4cd219b54dd675bad77c617626aad32e36b0e451061bdcf919cd
                                                                          • Opcode Fuzzy Hash: 0f4bd456ff895d9d9b0d35134a14c19471b6b00fdb09f0ce408e38df6822a28c
                                                                          • Instruction Fuzzy Hash: 25520874A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 13769cee966eceb029fd5dddc571fea56cb1b50a4f4f483ab935ec80575aa2d1
                                                                          • Instruction ID: 6bc8322556944ea7021f3c2f9b37dbac415e2d98c9969cde1b475275a0fda8a5
                                                                          • Opcode Fuzzy Hash: 13769cee966eceb029fd5dddc571fea56cb1b50a4f4f483ab935ec80575aa2d1
                                                                          • Instruction Fuzzy Hash: 3842F774A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 1abf8fc47c23010f210d614ef66a6b25ac019959d2d003af11e2aebd8e265bcd
                                                                          • Instruction ID: 55c10b48bf7bce3795fe85611994ebe63b07ad631a26adb87bf5dcee1941b09e
                                                                          • Opcode Fuzzy Hash: 1abf8fc47c23010f210d614ef66a6b25ac019959d2d003af11e2aebd8e265bcd
                                                                          • Instruction Fuzzy Hash: AA42F874A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: a20e447208885b2f11315e162cf95eb26c2699335960191edbc19cc6ce281b38
                                                                          • Instruction ID: 56f3e0a75a8a10f8708755d7a65eadd13914d0915787c4a771e1484defb5b7a2
                                                                          • Opcode Fuzzy Hash: a20e447208885b2f11315e162cf95eb26c2699335960191edbc19cc6ce281b38
                                                                          • Instruction Fuzzy Hash: 5442F874A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: fcdfe5d6c0bfc2d4b31e2dc32fa715633aefcf01d8861fe5454b4f2169bd1488
                                                                          • Instruction ID: a6c9cabbc63d832ef08039c8340c25ac70862ffe54c2d6418b0fce86e9d70288
                                                                          • Opcode Fuzzy Hash: fcdfe5d6c0bfc2d4b31e2dc32fa715633aefcf01d8861fe5454b4f2169bd1488
                                                                          • Instruction Fuzzy Hash: 2D42E874A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: fe7b455c3f3d9911717ab62c0ee17b1a27da35b1ca29b28b7d318324f697a35c
                                                                          • Instruction ID: 771474d6139c4703283ae910c3f41d3e46d9317868909e077196e2d3fb564d1b
                                                                          • Opcode Fuzzy Hash: fe7b455c3f3d9911717ab62c0ee17b1a27da35b1ca29b28b7d318324f697a35c
                                                                          • Instruction Fuzzy Hash: 3842F874A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 256a8fb2c846f4fa31ef6d9a7e7f9bd6dfd4c1c79e8726cbfb460eccedfdccf4
                                                                          • Instruction ID: b01ee3a6452924ab91fc5d7a4e221e8e75096eb3d17f2b62c802a35d27424421
                                                                          • Opcode Fuzzy Hash: 256a8fb2c846f4fa31ef6d9a7e7f9bd6dfd4c1c79e8726cbfb460eccedfdccf4
                                                                          • Instruction Fuzzy Hash: 7E420874A15228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3344DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: aee4352961ec35d7f4c9ac0c6b328c859ca29b9ed966dacb8e3afe4836a5230d
                                                                          • Instruction ID: 1561fb95f1d1b5498c01d1754b8628fde7d7e770e6fcb6bea26abe0a994df94c
                                                                          • Opcode Fuzzy Hash: aee4352961ec35d7f4c9ac0c6b328c859ca29b9ed966dacb8e3afe4836a5230d
                                                                          • Instruction Fuzzy Hash: 7342F874A14228CFCB65DF24D85879DBBB6BF88209F5080EAE50EA3354DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 7d7a6512c198d5841816e8c0a110aeef2b4dad8464c81d2721200b4f329ee4be
                                                                          • Instruction ID: 0cea680dc53f4d028195442318ceb0ca734e6dcaa5ce17388ae26a5b647d0cab
                                                                          • Opcode Fuzzy Hash: 7d7a6512c198d5841816e8c0a110aeef2b4dad8464c81d2721200b4f329ee4be
                                                                          • Instruction Fuzzy Hash: 4132F874A14228CFCB65EF24D85879DBBB6BF88205F5080EAE50EA3344DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: d827dc67e3cab1288702aed84f0506092d9465163b8c6dea3625b29d58776632
                                                                          • Instruction ID: 86d27f42c1d7c4dd0daaf17626091015127f997b23bdca306fd2175cd0e957b1
                                                                          • Opcode Fuzzy Hash: d827dc67e3cab1288702aed84f0506092d9465163b8c6dea3625b29d58776632
                                                                          • Instruction Fuzzy Hash: 3032F874A14228CFCB65EF24D85879DB7B6BF88205F5080EAE50AA3344DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: df8b7e437d782cb0e9ff4f53a89d0c04e4d47a9e076422391a70862b24fc704c
                                                                          • Instruction ID: 00f8f6ca351d196f5b485bb38f834db93ede102a109bdbdba4a9827df91482e8
                                                                          • Opcode Fuzzy Hash: df8b7e437d782cb0e9ff4f53a89d0c04e4d47a9e076422391a70862b24fc704c
                                                                          • Instruction Fuzzy Hash: CA32F974A15228CFCB65EF24D85879DB7B6BF88205F5080EAE50AA3344DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: bab34704fcf26b1ac6084284600664a09e4741febd561cf99947f561dbe24cac
                                                                          • Instruction ID: b44067a57e776ca1aeee3d438772dd9bde3f97b008cade2d6a390f9ba0d9ada1
                                                                          • Opcode Fuzzy Hash: bab34704fcf26b1ac6084284600664a09e4741febd561cf99947f561dbe24cac
                                                                          • Instruction Fuzzy Hash: 3632F874A14228CFCB65EF24D85879DBBB6BF88205F5080EAE50AA3354DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 68cfa41caf01b1db6e5fca6f47be0a0f826ed047a8c3af94d06838c39ec285d9
                                                                          • Instruction ID: 4b5b6183a7ceda84ea7c5d227ee11bb680e0e6fd3a3e5553c17861fde8eddbec
                                                                          • Opcode Fuzzy Hash: 68cfa41caf01b1db6e5fca6f47be0a0f826ed047a8c3af94d06838c39ec285d9
                                                                          • Instruction Fuzzy Hash: 6032F974A14229CFCB65EF24D85879DB7B6BF88205F5080EAD50AA3344DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 36fe20d7b4392d4d62d823cd8455c6f612857700bc6990ae90f24745a75fc389
                                                                          • Instruction ID: 1dd98eb3182bbad66cedf35429ff8ed05a5e2860b5ba239dab4a4e4019a6dccc
                                                                          • Opcode Fuzzy Hash: 36fe20d7b4392d4d62d823cd8455c6f612857700bc6990ae90f24745a75fc389
                                                                          • Instruction Fuzzy Hash: 2832F874A14228CFCB65EF24D85879DB7B6BF88209F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 3a8e5b54fba49682ca2e916355b6b1f126f286afb1f1ed141472c10d0e44a583
                                                                          • Instruction ID: 73cb89dd970874cdc3bc9358e1876dd2de5b2cebd3cf2aea8920816270b6462f
                                                                          • Opcode Fuzzy Hash: 3a8e5b54fba49682ca2e916355b6b1f126f286afb1f1ed141472c10d0e44a583
                                                                          • Instruction Fuzzy Hash: 5222F874A152288FCB65EF24D85879DB7B6BF88209F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 1b4e606cc93334444aeea6dc97120902f5bbbd67f4774ae2ba076ee6a260ae49
                                                                          • Instruction ID: edb091f31f61356bf3ee79a3da6fc504166edfc22cc1361d7ad4ee522681c33f
                                                                          • Opcode Fuzzy Hash: 1b4e606cc93334444aeea6dc97120902f5bbbd67f4774ae2ba076ee6a260ae49
                                                                          • Instruction Fuzzy Hash: 1522F874A142298FCB65EF24D85879DB7B6BF88205F5080EAD50EA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: a3bdcb33445b3b1081ca92f28a9dc5c9187cfd285939ebdc4b4efd12245a232c
                                                                          • Instruction ID: 4a749485d64c2ad47477e8939d39e30dfa3a5a75f9ace758e4aea4950dadd8fd
                                                                          • Opcode Fuzzy Hash: a3bdcb33445b3b1081ca92f28a9dc5c9187cfd285939ebdc4b4efd12245a232c
                                                                          • Instruction Fuzzy Hash: 09220874A152298FCB64EF34D85879DBBB6BF88205F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 4068f4509e82a86cc71f1649dce974c98cb75a002da53a63bdc36a0698a9c573
                                                                          • Instruction ID: c6be46c33006cdcca16a2d7a6b637de626cf09599b819ff43b9e638e0ea73212
                                                                          • Opcode Fuzzy Hash: 4068f4509e82a86cc71f1649dce974c98cb75a002da53a63bdc36a0698a9c573
                                                                          • Instruction Fuzzy Hash: C922F774A152298FCB64EF34D85879DBBB6BF88205F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 7061db1d717ba313d66b043e47a812e64e91e4e57ec3133b75f5cab831f4594d
                                                                          • Instruction ID: 36ecd591b551aed7117130b80c2fc91a438736728fb03583a616575bf54c6672
                                                                          • Opcode Fuzzy Hash: 7061db1d717ba313d66b043e47a812e64e91e4e57ec3133b75f5cab831f4594d
                                                                          • Instruction Fuzzy Hash: 0522F774A152298FCB64EF34D85879DBBB6BF88205F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 56ee301f3ce8d1a44ef0a28d1f877065e3081ad52ef0a8616a9a45a95cb49181
                                                                          • Instruction ID: 683656853688654748dc5b4bfd03359d333cd380f80b560d5046a6e67bc1d9d1
                                                                          • Opcode Fuzzy Hash: 56ee301f3ce8d1a44ef0a28d1f877065e3081ad52ef0a8616a9a45a95cb49181
                                                                          • Instruction Fuzzy Hash: 20120774A152298FCB64EF34D85879DBBB6BF88205F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 1bab1e8a478ea69ad40fd426e00a37e12893caaea8cd436f6e714c4616d6b17d
                                                                          • Instruction ID: d35488b020896fda0d9d0cca7d36268a278dfd7e9b1090dc88530a9b3110b952
                                                                          • Opcode Fuzzy Hash: 1bab1e8a478ea69ad40fd426e00a37e12893caaea8cd436f6e714c4616d6b17d
                                                                          • Instruction Fuzzy Hash: B3120774A152298FCB64EF34D85879DBBB6BF88205F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL ref: 0173119F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 91bce9aa1b99aeb33bd80dbabc52ef059695a0f54645a6fedbe2611bd4b31e64
                                                                          • Instruction ID: 91d2a289ee02891d3186534ca40d1acd65b227ada9a90948726e55b858fba54c
                                                                          • Opcode Fuzzy Hash: 91bce9aa1b99aeb33bd80dbabc52ef059695a0f54645a6fedbe2611bd4b31e64
                                                                          • Instruction Fuzzy Hash: 11120774A152298FCB64EF34D85879DBBB6BF88205F5080EAD50AA3384DF359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 6c8670c0b651c08c7c2d234302cd7e2b52c08673cd0d1fbc876b64bb8596a786
                                                                          • Instruction ID: 28b512e4075098490fa1e6634f61e666c7dd0d585c1724259619ef8392c92bcb
                                                                          • Opcode Fuzzy Hash: 6c8670c0b651c08c7c2d234302cd7e2b52c08673cd0d1fbc876b64bb8596a786
                                                                          • Instruction Fuzzy Hash: D3C12BB4915228CFCB65DF24D85879DB7B6BF88209F5080EAD60EA3380DB359E85CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0173154F
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 2170912c2e92ca036f2137ffb9882f55117025c553911c91d065976a3f8898b4
                                                                          • Instruction ID: 50ff3e91c510f26159cc44529aa810004fbb24acd8020cc6dd1d0a69ec7ef853
                                                                          • Opcode Fuzzy Hash: 2170912c2e92ca036f2137ffb9882f55117025c553911c91d065976a3f8898b4
                                                                          • Instruction Fuzzy Hash: 2AC13BB4915228CFCB65DF24C85879DBBB6BF88209F5040EAD60EA3390DB359E85CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: a798751200ce818d32c90fc7b63ddda726e5b504afdee63dac80b5d843dc8c1e
                                                                          • Instruction ID: c4f2911e6d94075d1660de1a2adb1745d87b11d83bbb17af1354b4fa18d04354
                                                                          • Opcode Fuzzy Hash: a798751200ce818d32c90fc7b63ddda726e5b504afdee63dac80b5d843dc8c1e
                                                                          • Instruction Fuzzy Hash: 10B14DB4911229CFCB65EF24C85879DB7B6BF88209F5040EAD60EA3380DB359E85CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: b8a88cb27ef91039a125b39d4c273b55f9f309713c702effe3869180ec976093
                                                                          • Instruction ID: 9ab7ac2d38880f1ab571f2c84493b65edf782ecf6e18cd5b3f6794f1630ce2ac
                                                                          • Opcode Fuzzy Hash: b8a88cb27ef91039a125b39d4c273b55f9f309713c702effe3869180ec976093
                                                                          • Instruction Fuzzy Hash: F0B13CB4A15228CFCB65DF24C85879DB7B6BF88209F5040EAD60EA3380DB359E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731627
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: b446c5ea4d084bf5f905acfdad6b3753473f798e9001470dee20c423044e3ac9
                                                                          • Instruction ID: 80473010aec4c44e6ed189d038d3a05fd854b495d5924de17abe130891c7633f
                                                                          • Opcode Fuzzy Hash: b446c5ea4d084bf5f905acfdad6b3753473f798e9001470dee20c423044e3ac9
                                                                          • Instruction Fuzzy Hash: BAB13DB4A11228CFCB64DF24C85879DB7B6BF88209F5040EAD60EA3380DB359E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 42177635b60dd8937611f78069b66df790782261af7a777a0491b5d95cef4e7a
                                                                          • Instruction ID: 8ab335e323cac6bf16b5f69bcf03e5041362e80bc3e7fe578106d11a8e72e016
                                                                          • Opcode Fuzzy Hash: 42177635b60dd8937611f78069b66df790782261af7a777a0491b5d95cef4e7a
                                                                          • Instruction Fuzzy Hash: A7A13DB4A11228CFCB64DF24C85879DB7B6BF88209F5040EAD60EA3391DB359E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 840f58dabd0c14789c064b1499375c6c4626bea6fe425309c2a488c010382a6d
                                                                          • Instruction ID: 14962cbac36c33600492c84f02dc083019ff3b75ad8ecf7e82c2b75c44285853
                                                                          • Opcode Fuzzy Hash: 840f58dabd0c14789c064b1499375c6c4626bea6fe425309c2a488c010382a6d
                                                                          • Instruction Fuzzy Hash: 01A14EB4A11229CFCB64EF24C85879DB7B6BF88209F5040E9D60EA3381DB358E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: d03ad766cd8b478e44bb6f7685ca21fedecd834954287250e4354e8402807ad2
                                                                          • Instruction ID: 4aa7e4f8e27e523c9a008b77026946e71bb99fc13a0595a45f6d99dbcdd87111
                                                                          • Opcode Fuzzy Hash: d03ad766cd8b478e44bb6f7685ca21fedecd834954287250e4354e8402807ad2
                                                                          • Instruction Fuzzy Hash: 1B913EB4A11229CFCB64DF24C85879DB7B6BF88209F5040E9D60EA3385DB358E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: c4f138eb20a22df09fe5427c700da3e9fd995cf398edda1cc8dc62305e3a9044
                                                                          • Instruction ID: 3536fe08c3931894fcf16f69dca68965a307c02a933efc49dd4aaa9e87343a38
                                                                          • Opcode Fuzzy Hash: c4f138eb20a22df09fe5427c700da3e9fd995cf398edda1cc8dc62305e3a9044
                                                                          • Instruction Fuzzy Hash: 60913FB4A11229CFCB64DF24C85879DB7B6BF88209F5080E9D60EA3385DB358E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: a25074c947cbefb40d60834b0547390e817b528733148461752faf8d8fd2fc40
                                                                          • Instruction ID: a9eec5c1514ce654699ebe98b5dd4bcd11b596bdaf6a6fa93ac76676a5940c53
                                                                          • Opcode Fuzzy Hash: a25074c947cbefb40d60834b0547390e817b528733148461752faf8d8fd2fc40
                                                                          • Instruction Fuzzy Hash: 5D813FB4A11229CFCB64DF24C85879DB7B6BF88209F5080E9D60AA3385DF358E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 0b334c8bff789bf3809f7ea55d321d1b07f66d2ed4d0e32b6cd9b617d3ba86a7
                                                                          • Instruction ID: 4fb1f433c1ee700e717ce81710b620243507144053a292a0de0ef25d17c99809
                                                                          • Opcode Fuzzy Hash: 0b334c8bff789bf3809f7ea55d321d1b07f66d2ed4d0e32b6cd9b617d3ba86a7
                                                                          • Instruction Fuzzy Hash: 438140B4A11229CFCB64EF24C85879DB7B6BF88209F5040E9D60EA3385DB358E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: f098266d6b8b95ebc6e70357b9f9f41543bae4d81231e97a3e57b92434ed0aea
                                                                          • Instruction ID: c1241c5cb6800630efbddd660d17789e4a36ac0922d911c4c96d7dddf1203c29
                                                                          • Opcode Fuzzy Hash: f098266d6b8b95ebc6e70357b9f9f41543bae4d81231e97a3e57b92434ed0aea
                                                                          • Instruction Fuzzy Hash: 357152B4A112298FDB64EF24C85879DB7B6BF84209F4040E9D60AA3385DF358E85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 7eefd9d40f1bf267941eeeeb5355642f59eb91ace7c6731018b1d78239533660
                                                                          • Instruction ID: d1a6affd93844bae3216eb24729f6036192ccefe925e961d64bdb7e50d144d56
                                                                          • Opcode Fuzzy Hash: 7eefd9d40f1bf267941eeeeb5355642f59eb91ace7c6731018b1d78239533660
                                                                          • Instruction Fuzzy Hash: 57612730A00319DFDB15EBB8D458BAEBBF2AF84215F208829E512E7394DF399945CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 3267fdfa74d8dea7db71f3e9d948ee65c99666cfc3dca3b86f3b31af80b95bc4
                                                                          • Instruction ID: fe6118aef93c15df197d46b75b074cb763c849531d919d39464619fd337a3e81
                                                                          • Opcode Fuzzy Hash: 3267fdfa74d8dea7db71f3e9d948ee65c99666cfc3dca3b86f3b31af80b95bc4
                                                                          • Instruction Fuzzy Hash: C07142B4A112288FDB64EF24C85879DB7B6BF88209F5080E9D60EA3385DF358D85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 4b91ee6bc5a9c3e974791a7da37bf2240128bbfd1ca2041eec31d26eb5727e44
                                                                          • Instruction ID: 77f6156c35e37f5fdccc9f6e05b30cb7188255da291e15e2ef1901a49462beae
                                                                          • Opcode Fuzzy Hash: 4b91ee6bc5a9c3e974791a7da37bf2240128bbfd1ca2041eec31d26eb5727e44
                                                                          • Instruction Fuzzy Hash: 256142B4A112288FDBA4EF24C85879DB7B6BF88205F5080E9D60EA3385DF358D85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 253647f6f1f91f7a56a15410dbf46d63bc3c271ea35c256b53b610d9394101a4
                                                                          • Instruction ID: 21d4a4b381ea2b38f1306b2e132141b40786dd069119e7cf2adc4133ced8a69e
                                                                          • Opcode Fuzzy Hash: 253647f6f1f91f7a56a15410dbf46d63bc3c271ea35c256b53b610d9394101a4
                                                                          • Instruction Fuzzy Hash: 896153B4A112298FDBA4EF24C85879DB7B6BF88205F4080E9D60EA3385DF358D85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 01731955
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496709738.0000000001730000.00000040.00000001.sdmp, Offset: 01730000, based on PE: false
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 3226b0262223dd8ffb28e3e00bf9ef8b220cace0eeebf4b0e64ec30e5b222628
                                                                          • Instruction ID: 06adfee14365d9b48b79de5dcfafc6f1898cfecff05efe3ab8b222cd28cff2a2
                                                                          • Opcode Fuzzy Hash: 3226b0262223dd8ffb28e3e00bf9ef8b220cace0eeebf4b0e64ec30e5b222628
                                                                          • Instruction Fuzzy Hash: A45163B4A112288FDBA4EF24C85879DB7B6BF88205F4080E9D609E3385DF358D85CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 81a47726c86af8b50f3617408812783b2f865814f652fb0b708fbfd05212b83c
                                                                          • Instruction ID: b79cd385f461df9a28e023f3d736542c35404b3925a5f59364f7c0d7b24e82d8
                                                                          • Opcode Fuzzy Hash: 81a47726c86af8b50f3617408812783b2f865814f652fb0b708fbfd05212b83c
                                                                          • Instruction Fuzzy Hash: 2A516135A003059FCB14EBB4D888AEEB7F6BF84214F14856DE5069B395EF34E8458BA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 01707F47
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: GlobalMemoryStatus
                                                                          • String ID:
                                                                          • API String ID: 1890195054-0
                                                                          • Opcode ID: ea134b756931d669dc63a9a4456050ad3306754934522300c044bf01438beeb2
                                                                          • Instruction ID: 945dd7aacc406904216e492074b99c7c0a79b9f802c248d9a9e54d72e77eb079
                                                                          • Opcode Fuzzy Hash: ea134b756931d669dc63a9a4456050ad3306754934522300c044bf01438beeb2
                                                                          • Instruction Fuzzy Hash: BA414671E083998FCB05CB75C8546DAFFF5AF89210F0985AAD144A7281DB78A885CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 7cd91b26de866c8e6dfeb2b6a916b8152e7b2f1852d95add64fd526cc70956f5
                                                                          • Instruction ID: 07425ac653cf93aedd250f24da7a5f76049f4845146ca1591d246332328812d0
                                                                          • Opcode Fuzzy Hash: 7cd91b26de866c8e6dfeb2b6a916b8152e7b2f1852d95add64fd526cc70956f5
                                                                          • Instruction Fuzzy Hash: 1E417471A00305DFCB15EFB4D888AEEB7F6BF84214F148569E5029B395EF34E8458BA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 016FEB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496504543.00000000016F0000.00000040.00000001.sdmp, Offset: 016F0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: f0d3ef7127851db105474a1e1b4525cd59d7d7e0126e0856ee37be6f5cdc851b
                                                                          • Instruction ID: 85b52b03e93fb8a0ab61dbef4cb8560c597a2d62cb240ac7d8665c7960c34341
                                                                          • Opcode Fuzzy Hash: f0d3ef7127851db105474a1e1b4525cd59d7d7e0126e0856ee37be6f5cdc851b
                                                                          • Instruction Fuzzy Hash: E54122B1E043599FDB10CFA9C884A9EBFF5BB48304F16802EE919AB350D7759845CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 016FEB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496504543.00000000016F0000.00000040.00000001.sdmp, Offset: 016F0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: de8bfecebccad8e0d9cba4314799e7e7bb90ac6b7f1b103745591ccbd5c94709
                                                                          • Instruction ID: 8c47da4bf341ceb03da0e4c1e78d151eed3c6004ee612a1c951afa69c58c3751
                                                                          • Opcode Fuzzy Hash: de8bfecebccad8e0d9cba4314799e7e7bb90ac6b7f1b103745591ccbd5c94709
                                                                          • Instruction Fuzzy Hash: 6C31EDB1D0025C9FCB20CF9AC984A9EBFF5BF48310F55812AE91AAB314C7759945CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 016FEB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496504543.00000000016F0000.00000040.00000001.sdmp, Offset: 016F0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: 9853e3438607ac1eebf778f6a3a8dd06ed7feb764eba8abd2a53667f062bfaa6
                                                                          • Instruction ID: 426fce9d5f1c74d49e7e3b0a76a7f29904caa6b908d18dff27150e44db191993
                                                                          • Opcode Fuzzy Hash: 9853e3438607ac1eebf778f6a3a8dd06ed7feb764eba8abd2a53667f062bfaa6
                                                                          • Instruction Fuzzy Hash: 5831FEB1D002589FCB20CF9AC984A9EBFF5BB48310F55812AE91AAB310C7759905CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 016FE8C4
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496504543.00000000016F0000.00000040.00000001.sdmp, Offset: 016F0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID:
                                                                          • API String ID: 71445658-0
                                                                          • Opcode ID: 190c017d0afe3d6f5f500f934cd6e386681371a462e5a2c18269a873987f30de
                                                                          • Instruction ID: d095253063a0a95bd913a5cfbe29fdc6ec35859514b9cd2d74f68b71e87f374d
                                                                          • Opcode Fuzzy Hash: 190c017d0afe3d6f5f500f934cd6e386681371a462e5a2c18269a873987f30de
                                                                          • Instruction Fuzzy Hash: DB31E2B0D042489FDB10CF99C984A8EFFF5BB49304F6A816EE509AB351C7769945CBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 016FE8C4
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496504543.00000000016F0000.00000040.00000001.sdmp, Offset: 016F0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID:
                                                                          • API String ID: 71445658-0
                                                                          • Opcode ID: bec02ee965b326d1f43048fe43e0b6debb0dff8a423b6e7db69c4e9a76ab70f8
                                                                          • Instruction ID: 3415fa239a3e691b0b7d0f3de29f3b84497ae2b8b2b0561d7637c13d198de17c
                                                                          • Opcode Fuzzy Hash: bec02ee965b326d1f43048fe43e0b6debb0dff8a423b6e7db69c4e9a76ab70f8
                                                                          • Instruction Fuzzy Hash: 5731FDB0D002498FDB10CF99C584A8EFFF5BB49314F2A816AE509AB310C7769985CBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,014C1A79,00000800), ref: 014C1B0A
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.495371752.00000000014C0000.00000040.00000001.sdmp, Offset: 014C0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: af599a851009f8af2fa3e863dcd4c0c1f7e094a2e1fd0f5f8b2e3186b8ada182
                                                                          • Instruction ID: fd917c4840d3238ffb0a5abca75c78efa4b42142d3834a9f1581171482033469
                                                                          • Opcode Fuzzy Hash: af599a851009f8af2fa3e863dcd4c0c1f7e094a2e1fd0f5f8b2e3186b8ada182
                                                                          • Instruction Fuzzy Hash: 952177B98043898FCB10CFAAC884BDEBFF4AB49B20F04846EE515A7251C375A444CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetWindowsHookExW.USER32(0000000D,00000000,?,?), ref: 01708C53
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: HookWindows
                                                                          • String ID:
                                                                          • API String ID: 2559412058-0
                                                                          • Opcode ID: 0827a9e0261eab4743353d6763f3bc2ee8573fb6eecc8de11daf263209280e10
                                                                          • Instruction ID: a1e5ebeeb6183234b6e15247a074a58d2a14f144097376b3ff2b3d7714056c3b
                                                                          • Opcode Fuzzy Hash: 0827a9e0261eab4743353d6763f3bc2ee8573fb6eecc8de11daf263209280e10
                                                                          • Instruction Fuzzy Hash: C12135B5D002089FCB14CF9AC844BEFFBF5BB88324F14842AE419A7290C775A944CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,014C1A79,00000800), ref: 014C1B0A
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.495371752.00000000014C0000.00000040.00000001.sdmp, Offset: 014C0000, based on PE: false
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: 78f00a95f895ceafe9a00e4b8e76af0a60141e0a1d6f730d593cca6827d42e14
                                                                          • Instruction ID: e5b354860be11a72c1f6b20ae3b06aacd108e6080deff1e6ab3d16015acac1c9
                                                                          • Opcode Fuzzy Hash: 78f00a95f895ceafe9a00e4b8e76af0a60141e0a1d6f730d593cca6827d42e14
                                                                          • Instruction Fuzzy Hash: 541100B6D002488FDB10CF9AC488B9EFBF4EB88724F54846EE515A7210D375A945CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: be51a07cfae6b00a2bdfd639bf946bbfeb6f74b92f911087a22fae2d02c07520
                                                                          • Instruction ID: fb1c293ca5e2b914baf218eafa1d1efa5345c7a8fe7ffde944173ee99105a894
                                                                          • Opcode Fuzzy Hash: be51a07cfae6b00a2bdfd639bf946bbfeb6f74b92f911087a22fae2d02c07520
                                                                          • Instruction Fuzzy Hash: C0111770A00308DFDB15DFA8D59879DFBB2FF48305F248928D401A7295DB36A989CF40
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 01707F47
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.496564235.0000000001700000.00000040.00000001.sdmp, Offset: 01700000, based on PE: false
                                                                          Similarity
                                                                          • API ID: GlobalMemoryStatus
                                                                          • String ID:
                                                                          • API String ID: 1890195054-0
                                                                          • Opcode ID: 09b541d302c4274aaa3659ab1287b1b35b9f51d4fe67ffc8261f8ba1e5d2a5c1
                                                                          • Instruction ID: d4203f1e26f555d96f8fb9176bca95a37a87fed57dfb174dbb2576f0995d5887
                                                                          • Opcode Fuzzy Hash: 09b541d302c4274aaa3659ab1287b1b35b9f51d4fe67ffc8261f8ba1e5d2a5c1
                                                                          • Instruction Fuzzy Hash: 4B1120B1C0066A9BCB10CF9AC444BDEFBF4BF48224F15816AE918B7240D378A945CFE1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.497016382.00000000017CD000.00000040.00000001.sdmp, Offset: 017CD000, based on PE: false
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: db5edba1bf600e6433b3555c67b9c1d11c734d0a9f1b9990572b45c54c80b225
                                                                          • Instruction ID: adf1b8f309c56e1228d6c4b61088322d07767133c83d7d564a274f530239825c
                                                                          • Opcode Fuzzy Hash: db5edba1bf600e6433b3555c67b9c1d11c734d0a9f1b9990572b45c54c80b225
                                                                          • Instruction Fuzzy Hash: D42137B5504204DFCB25CF68D4C4B16FBA1FB88754F24C5BDE94A4B246C376D887CAA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Non-executed Functions