Loading ...

Play interactive tourEdit tour

Windows Analysis Report DC2zX44MQr

Overview

General Information

Sample Name:DC2zX44MQr (renamed file extension from none to dll)
Analysis ID:492503
MD5:94f8317b419e9476120b14a29d9b05d2
SHA1:f2b03dd4441f3808468bdbb8b26273cfb41b5298
SHA256:2f10b593a5e04506d8050ebe39e28619199958a4f4bae0b9f3a1ee2af3d74862
Tags:Dridexexe
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Queues an APC in another process (thread injection)
Machine Learning detection for dropped file
Uses Atom Bombing / ProGate to inject into other processes
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Uses the system / local time for branch decision (may execute only at specific dates)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Binary contains a suspicious time stamp
Potential key logger detected (key state polling based)
PE file contains more sections than normal
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • loaddll64.exe (PID: 6552 cmdline: loaddll64.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll' MD5: E0CC9D126C39A9D2FA1CAD5027EBBD18)
    • cmd.exe (PID: 6576 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6600 cmdline: rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6584 cmdline: rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,DisplaySYSDMCPL MD5: 73C519F050C20580F8A62C849D49215A)
      • explorer.exe (PID: 3292 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • DmNotificationBroker.exe (PID: 3476 cmdline: C:\Windows\system32\DmNotificationBroker.exe MD5: 1643D5735213BC89C0012F0E48253765)
        • DmNotificationBroker.exe (PID: 6464 cmdline: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe MD5: 1643D5735213BC89C0012F0E48253765)
        • RdpSa.exe (PID: 4488 cmdline: C:\Windows\system32\RdpSa.exe MD5: 0795B6F790F8E52D55F39E593E9C5BBA)
        • RdpSa.exe (PID: 2152 cmdline: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe MD5: 0795B6F790F8E52D55F39E593E9C5BBA)
        • Utilman.exe (PID: 2884 cmdline: C:\Windows\system32\Utilman.exe MD5: C91CCEF3884CFDE746B4BAEF5F1BC75C)
        • Utilman.exe (PID: 3596 cmdline: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe MD5: C91CCEF3884CFDE746B4BAEF5F1BC75C)
        • EaseOfAccessDialog.exe (PID: 6104 cmdline: C:\Windows\system32\EaseOfAccessDialog.exe MD5: F87F2E5EBF3FFBA39DF1621B5F8689B5)
        • EaseOfAccessDialog.exe (PID: 6128 cmdline: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe MD5: F87F2E5EBF3FFBA39DF1621B5F8689B5)
        • DevicePairingWizard.exe (PID: 5024 cmdline: C:\Windows\system32\DevicePairingWizard.exe MD5: E23643C785D498FF73B5C9D7EA173C3D)
        • DevicePairingWizard.exe (PID: 4804 cmdline: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe MD5: E23643C785D498FF73B5C9D7EA173C3D)
        • wermgr.exe (PID: 4896 cmdline: C:\Windows\system32\wermgr.exe MD5: FF214585BF10206E21EA8EBA202FACFD)
        • wermgr.exe (PID: 5600 cmdline: C:\Users\user\AppData\Local\xlPP\wermgr.exe MD5: FF214585BF10206E21EA8EBA202FACFD)
        • mstsc.exe (PID: 6664 cmdline: C:\Windows\system32\mstsc.exe MD5: 3FBB5CD8829E9533D0FF5819DB0444C0)
        • mstsc.exe (PID: 6636 cmdline: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe MD5: 3FBB5CD8829E9533D0FF5819DB0444C0)
    • rundll32.exe (PID: 6676 cmdline: rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditEnvironmentVariables MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6808 cmdline: rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditUserProfiles MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000023.00000002.498301124.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    00000026.00000002.525725102.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      00000003.00000002.252587929.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          00000006.00000002.258809816.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 7 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: DC2zX44MQr.dllVirustotal: Detection: 67%Perma Link
            Source: DC2zX44MQr.dllReversingLabs: Detection: 80%
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: DC2zX44MQr.dllAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\sBx0fm\VERSION.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\xlPP\wer.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\credui.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\zLYZkwYH\WINSTA.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\mJLa\MFC42u.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\rm4w0\OLEACC.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Machine Learning detection for sampleShow sources
            Source: DC2zX44MQr.dllJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\sBx0fm\VERSION.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\xlPP\wer.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\credui.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\zLYZkwYH\WINSTA.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\mJLa\MFC42u.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\rm4w0\OLEACC.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A414F52C CryptProtectData,LocalAlloc,LocalFree,40_2_00007FF7A414F52C
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A414F8FC CryptBinaryToStringW,LocalAlloc,CryptBinaryToStringW,LocalFree,40_2_00007FF7A414F8FC
            Source: DC2zX44MQr.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: DmNotificationBroker.pdb source: DmNotificationBroker.exe, 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp, DmNotificationBroker.exe.5.dr
            Source: Binary string: Utilman.pdb source: Utilman.exe, 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp, Utilman.exe.5.dr
            Source: Binary string: PasswordOnWakeSettingFlyout.pdb source: PasswordOnWakeSettingFlyout.exe.5.dr
            Source: Binary string: RdpSa.pdbGCTL source: RdpSa.exe, 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp, RdpSa.exe.5.dr
            Source: Binary string: psr.pdbGCTL source: psr.exe.5.dr
            Source: Binary string: EaseOfAccessDialog.pdb source: EaseOfAccessDialog.exe, 00000021.00000002.460475835.00007FF792C3E000.00000002.00020000.sdmp, EaseOfAccessDialog.exe.5.dr
            Source: Binary string: RdpSa.pdb source: RdpSa.exe, 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp, RdpSa.exe.5.dr
            Source: Binary string: DmNotificationBroker.pdbGCTL source: DmNotificationBroker.exe, 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp, DmNotificationBroker.exe.5.dr
            Source: Binary string: PasswordOnWakeSettingFlyout.pdbGCTL source: PasswordOnWakeSettingFlyout.exe.5.dr
            Source: Binary string: EaseOfAccessDialog.pdbGCTL source: EaseOfAccessDialog.exe, 00000021.00000002.460475835.00007FF792C3E000.00000002.00020000.sdmp, EaseOfAccessDialog.exe.5.dr
            Source: Binary string: WerMgr.pdb source: wermgr.exe, 00000026.00000000.503200153.00007FF776FB5000.00000002.00020000.sdmp, wermgr.exe.5.dr
            Source: Binary string: RDVGHelper.pdbGCTL source: RDVGHelper.exe.5.dr
            Source: Binary string: Utilman.pdbGCTL source: Utilman.exe, 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp, Utilman.exe.5.dr
            Source: Binary string: DevicePairingWizard.pdb source: DevicePairingWizard.exe, 00000023.00000000.476451806.00007FF6CB027000.00000002.00020000.sdmp, DevicePairingWizard.exe.5.dr
            Source: Binary string: mstsc.pdbGCTL source: mstsc.exe, 00000028.00000000.532448081.00007FF7A41F4000.00000002.00020000.sdmp, mstsc.exe.5.dr
            Source: Binary string: mstsc.pdb source: mstsc.exe, 00000028.00000000.532448081.00007FF7A41F4000.00000002.00020000.sdmp, mstsc.exe.5.dr
            Source: Binary string: psr.pdb source: psr.exe.5.dr
            Source: Binary string: RDVGHelper.pdb source: RDVGHelper.exe.5.dr
            Source: Binary string: DevicePairingWizard.pdbGCTL source: DevicePairingWizard.exe, 00000023.00000000.476451806.00007FF6CB027000.00000002.00020000.sdmp, DevicePairingWizard.exe.5.dr
            Source: Binary string: WerMgr.pdbGCTL source: wermgr.exe, 00000026.00000000.503200153.00007FF776FB5000.00000002.00020000.sdmp, wermgr.exe.5.dr
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005D290 FindFirstFileExW,0_2_000000014005D290
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FABE54 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,CompareStringW,FindNextFileW,FindClose,FindClose,38_2_00007FF776FABE54
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB1BA0 FindFirstFileExW,_wcsicmp,_wcsicmp,FindNextFileW,GetLastError,GetLastError,FindClose,38_2_00007FF776FB1BA0
            Source: explorer.exe, 00000005.00000000.301625315.0000000006840000.00000004.00000001.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF7198411A0 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendInput,28_2_00007FF7198411A0
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C3956C GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,memset,SendInput,33_2_00007FF792C3956C

            E-Banking Fraud:

            barindex
            Yara detected Dridex unpacked fileShow sources
            Source: Yara matchFile source: 00000023.00000002.498301124.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000026.00000002.525725102.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.252587929.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.258809816.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.330302590.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.266253941.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.366691390.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.429090698.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.555665664.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.459149344.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.393120079.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400348700_2_0000000140034870
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400352700_2_0000000140035270
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140048AC00_2_0000000140048AC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005C3400_2_000000014005C340
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140065B800_2_0000000140065B80
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006A4B00_2_000000014006A4B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400524B00_2_00000001400524B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140026CC00_2_0000000140026CC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004BD400_2_000000014004BD40
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400495B00_2_00000001400495B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140036F300_2_0000000140036F30
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400690100_2_0000000140069010
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400010100_2_0000000140001010
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400660200_2_0000000140066020
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002F8400_2_000000014002F840
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005D8500_2_000000014005D850
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400640800_2_0000000140064080
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400108800_2_0000000140010880
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400688A00_2_00000001400688A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002D0D00_2_000000014002D0D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400018D00_2_00000001400018D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400161000_2_0000000140016100
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001D1000_2_000000014001D100
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002A1100_2_000000014002A110
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001D9100_2_000000014001D910
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400151200_2_0000000140015120
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000B1200_2_000000014000B120
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004F9400_2_000000014004F940
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400391400_2_0000000140039140
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400231400_2_0000000140023140
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400579500_2_0000000140057950
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001E1700_2_000000014001E170
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400029800_2_0000000140002980
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400611A00_2_00000001400611A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400389A00_2_00000001400389A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400381A00_2_00000001400381A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002E1B00_2_000000014002E1B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400139D00_2_00000001400139D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400319F00_2_00000001400319F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002EA000_2_000000014002EA00
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140022A000_2_0000000140022A00
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003B2200_2_000000014003B220
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140067A400_2_0000000140067A40
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140069A500_2_0000000140069A50
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140007A600_2_0000000140007A60
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003AAC00_2_000000014003AAC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003A2E00_2_000000014003A2E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140062B000_2_0000000140062B00
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400183000_2_0000000140018300
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002FB200_2_000000014002FB20
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400313400_2_0000000140031340
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400223400_2_0000000140022340
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140017B400_2_0000000140017B40
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000BB400_2_000000014000BB40
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004EB600_2_000000014004EB60
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400053700_2_0000000140005370
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002CB800_2_000000014002CB80
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B3900_2_000000014006B390
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140054BA00_2_0000000140054BA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140033BB00_2_0000000140033BB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400263C00_2_00000001400263C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400123C00_2_00000001400123C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140063BD00_2_0000000140063BD0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400663F00_2_00000001400663F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140023BF00_2_0000000140023BF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B41B0_2_000000014006B41B
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B4240_2_000000014006B424
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B42D0_2_000000014006B42D
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B4360_2_000000014006B436
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B43D0_2_000000014006B43D
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400244400_2_0000000140024440
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140005C400_2_0000000140005C40
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006B4460_2_000000014006B446
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005F4900_2_000000014005F490
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140022D000_2_0000000140022D00
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400355200_2_0000000140035520
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140019D200_2_0000000140019D20
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400305300_2_0000000140030530
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400235300_2_0000000140023530
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400315400_2_0000000140031540
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400335400_2_0000000140033540
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014007BD500_2_000000014007BD50
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400785700_2_0000000140078570
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400195800_2_0000000140019580
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400205A00_2_00000001400205A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140025DB00_2_0000000140025DB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140071DC00_2_0000000140071DC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000C5C00_2_000000014000C5C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002DDE00_2_000000014002DDE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140031DF00_2_0000000140031DF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000DDF00_2_000000014000DDF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400016200_2_0000000140001620
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400186300_2_0000000140018630
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400326500_2_0000000140032650
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140064E800_2_0000000140064E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140016E800_2_0000000140016E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140007EA00_2_0000000140007EA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400286B00_2_00000001400286B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140006EB00_2_0000000140006EB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400276C00_2_00000001400276C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002FEC00_2_000000014002FEC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002EED00_2_000000014002EED0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002B6E00_2_000000014002B6E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140053F200_2_0000000140053F20
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400227300_2_0000000140022730
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400297800_2_0000000140029780
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140018F800_2_0000000140018F80
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003EFB00_2_000000014003EFB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400067B00_2_00000001400067B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400667D00_2_00000001400667D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140060FE00_2_0000000140060FE0
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D52BA025_2_00007FF644D52BA0
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D522B025_2_00007FF644D522B0
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF719844AA428_2_00007FF719844AA4
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF7198416F828_2_00007FF7198416F8
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984B23028_2_00007FF71984B230
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF719849A1028_2_00007FF719849A10
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF7198418D028_2_00007FF7198418D0
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C32FD033_2_00007FF792C32FD0
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C37F6C33_2_00007FF792C37F6C
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C3689033_2_00007FF792C36890
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C3483033_2_00007FF792C34830
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeCode function: 35_2_00007FF6CB0231D035_2_00007FF6CB0231D0
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB243838_2_00007FF776FB2438
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA684838_2_00007FF776FA6848
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB0A5838_2_00007FF776FB0A58
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA7EFC38_2_00007FF776FA7EFC
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA2F5438_2_00007FF776FA2F54
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FAE36838_2_00007FF776FAE368
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FACFF038_2_00007FF776FACFF0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E39A040_2_00007FF7A40E39A0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E8DF040_2_00007FF7A40E8DF0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E35EC40_2_00007FF7A40E35EC
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40ECE0840_2_00007FF7A40ECE08
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A416169040_2_00007FF7A4161690
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40DDA8C40_2_00007FF7A40DDA8C
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40EEAB440_2_00007FF7A40EEAB4
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40D4EC440_2_00007FF7A40D4EC4
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40F12E040_2_00007FF7A40F12E0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A411432040_2_00007FF7A4114320
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40D6B9440_2_00007FF7A40D6B94
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E77C040_2_00007FF7A40E77C0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40D541040_2_00007FF7A40D5410
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E806040_2_00007FF7A40E8060
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40EA85840_2_00007FF7A40EA858
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E84C040_2_00007FF7A40E84C0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E64DC40_2_00007FF7A40E64DC
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140046C90 NtClose,0_2_0000000140046C90
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014006A4B0 NtQuerySystemInformation,0_2_000000014006A4B0
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984A2C8 NtQueryWnfStateData,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CoCreateInstance,SystemParametersInfoW,28_2_00007FF71984A2C8
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF719849640 NtQueryWnfStateData,28_2_00007FF719849640
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C338C0 NtQueryWnfStateData,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CoCreateInstance,SystemParametersInfoW,33_2_00007FF792C338C0
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C3C164 NtQueryWnfStateData,33_2_00007FF792C3C164
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB2438 LoadLibraryExW,GetProcAddress,NtQueryLicenseValue,FreeLibrary,NtQueryLicenseValue,38_2_00007FF776FB2438
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA82EC DbgPrintEx,NtQueryInformationProcess,DbgPrintEx,DbgPrintEx,ReadProcessMemory,DbgPrintEx,GetLastError,38_2_00007FF776FA82EC
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB1F54 NtQueryLicenseValue,38_2_00007FF776FB1F54
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FAE368 ZwQueryWnfStateNameInformation,ZwUpdateWnfStateData,EtwEventWriteNoRegistration,NtQuerySystemInformation,NtOpenEvent,NtWaitForSingleObject,NtClose,RtlAllocateAndInitializeSid,RtlInitUnicodeString,memset,NtAlpcConnectPort,memset,NtAlpcSendWaitReceivePort,RtlFreeSid,NtClose,38_2_00007FF776FAE368
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA8404 DbgPrintEx,NtQueryInformationProcess,DbgPrintEx,DbgPrintEx,ReadProcessMemory,DbgPrintEx,GetLastError,38_2_00007FF776FA8404
            Source: DmNotificationBroker.exe.5.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: DC2zX44MQr.dllBinary or memory string: OriginalFilenamekbdyj% vs DC2zX44MQr.dll
            Source: EaseOfAccessDialog.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: EaseOfAccessDialog.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: EaseOfAccessDialog.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: DevicePairingWizard.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wermgr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wermgr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wermgr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: psr.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: DUI70.dll0.5.drStatic PE information: Number of sections : 40 > 10
            Source: DUI70.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: WTSAPI32.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: DC2zX44MQr.dllStatic PE information: Number of sections : 39 > 10
            Source: WINSTA.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: wer.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: DUI70.dll1.5.drStatic PE information: Number of sections : 40 > 10
            Source: VERSION.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: credui.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: MFC42u.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: OLEACC.dll.5.drStatic PE information: Number of sections : 40 > 10
            Source: DC2zX44MQr.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: DUI70.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: WINSTA.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: DUI70.dll0.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: OLEACC.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: MFC42u.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: wer.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: credui.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: DUI70.dll1.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: WTSAPI32.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: VERSION.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: DC2zX44MQr.dllVirustotal: Detection: 67%
            Source: DC2zX44MQr.dllReversingLabs: Detection: 80%
            Source: DC2zX44MQr.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll'
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,DisplaySYSDMCPL
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditEnvironmentVariables
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditUserProfiles
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\DmNotificationBroker.exe C:\Windows\system32\DmNotificationBroker.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\RdpSa.exe C:\Windows\system32\RdpSa.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\Utilman.exe C:\Windows\system32\Utilman.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\EaseOfAccessDialog.exe C:\Windows\system32\EaseOfAccessDialog.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\DevicePairingWizard.exe C:\Windows\system32\DevicePairingWizard.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\xlPP\wermgr.exe C:\Users\user\AppData\Local\xlPP\wermgr.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\mstsc.exe C:\Windows\system32\mstsc.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,DisplaySYSDMCPLJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditEnvironmentVariablesJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditUserProfilesJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1Jump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\DmNotificationBroker.exe C:\Windows\system32\DmNotificationBroker.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\RdpSa.exe C:\Windows\system32\RdpSa.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\Utilman.exe C:\Windows\system32\Utilman.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\EaseOfAccessDialog.exe C:\Windows\system32\EaseOfAccessDialog.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\DevicePairingWizard.exe C:\Windows\system32\DevicePairingWizard.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\xlPP\wermgr.exe C:\Users\user\AppData\Local\xlPP\wermgr.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\mstsc.exe C:\Windows\system32\mstsc.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\eb42b1a5c308fc11edf1ddbdd25c8486_d06ed635-68f6-4e9a-955c-4899f5f57b9aJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winDLL@45/21@0/0
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeCode function: 19_2_00007FF686901A1C CoInitializeEx,InitProcessPriv,InitThread,CoCreateInstance,#100,TranslateMessage,DispatchMessageW,GetMessageW,#101,UnInitThread,UnInitProcessPriv,CoUninitialize,19_2_00007FF686901A1C
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: RtlInitUnicodeString,RtlCreateBoundaryDescriptor,RtlInitUnicodeString,RtlCreateServiceSid,GetProcessHeap,HeapAlloc,RtlCreateServiceSid,RtlAddSIDToBoundaryDescriptor,OpenPrivateNamespaceW,GetLastError,GetProcessHeap,HeapFree,RtlDeleteBoundaryDescriptor,38_2_00007FF776FADE98
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D541EC LoadStringW,GetLastError,LoadStringW,GetLastError,FormatMessageW,GetLastError,WinStationSendMessageW,GetLastError,LocalFree,25_2_00007FF644D541EC
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA1A70 CreateToolhelp32Snapshot,GetLastError,Process32FirstW,GetLastError,_wcsicmp,Process32NextW,CloseHandle,38_2_00007FF776FA1A70
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,DisplaySYSDMCPL
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeMutant created: \Sessions\1\BaseNamedObjects\{a917c379-c9d3-7f7b-0d3b-a731b6dfaaa9}
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeMutant created: \Sessions\1\BaseNamedObjects\{19d566d2-4a0e-150a-d927-cc8fa9ee6bbf}
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF719846A78 LoadResource,LockResource,SizeofResource,28_2_00007FF719846A78
            Source: DC2zX44MQr.dllStatic PE information: Image base 0x140000000 > 0x60000000
            Source: DC2zX44MQr.dllStatic file information: File size 1236992 > 1048576
            Source: DC2zX44MQr.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: DmNotificationBroker.pdb source: DmNotificationBroker.exe, 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp, DmNotificationBroker.exe.5.dr
            Source: Binary string: Utilman.pdb source: Utilman.exe, 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp, Utilman.exe.5.dr
            Source: Binary string: PasswordOnWakeSettingFlyout.pdb source: PasswordOnWakeSettingFlyout.exe.5.dr
            Source: Binary string: RdpSa.pdbGCTL source: RdpSa.exe, 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp, RdpSa.exe.5.dr
            Source: Binary string: psr.pdbGCTL source: psr.exe.5.dr
            Source: Binary string: EaseOfAccessDialog.pdb source: EaseOfAccessDialog.exe, 00000021.00000002.460475835.00007FF792C3E000.00000002.00020000.sdmp, EaseOfAccessDialog.exe.5.dr
            Source: Binary string: RdpSa.pdb source: RdpSa.exe, 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp, RdpSa.exe.5.dr
            Source: Binary string: DmNotificationBroker.pdbGCTL source: DmNotificationBroker.exe, 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp, DmNotificationBroker.exe.5.dr
            Source: Binary string: PasswordOnWakeSettingFlyout.pdbGCTL source: PasswordOnWakeSettingFlyout.exe.5.dr
            Source: Binary string: EaseOfAccessDialog.pdbGCTL source: EaseOfAccessDialog.exe, 00000021.00000002.460475835.00007FF792C3E000.00000002.00020000.sdmp, EaseOfAccessDialog.exe.5.dr
            Source: Binary string: WerMgr.pdb source: wermgr.exe, 00000026.00000000.503200153.00007FF776FB5000.00000002.00020000.sdmp, wermgr.exe.5.dr
            Source: Binary string: RDVGHelper.pdbGCTL source: RDVGHelper.exe.5.dr
            Source: Binary string: Utilman.pdbGCTL source: Utilman.exe, 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp, Utilman.exe.5.dr
            Source: Binary string: DevicePairingWizard.pdb source: DevicePairingWizard.exe, 00000023.00000000.476451806.00007FF6CB027000.00000002.00020000.sdmp, DevicePairingWizard.exe.5.dr
            Source: Binary string: mstsc.pdbGCTL source: mstsc.exe, 00000028.00000000.532448081.00007FF7A41F4000.00000002.00020000.sdmp, mstsc.exe.5.dr
            Source: Binary string: mstsc.pdb source: mstsc.exe, 00000028.00000000.532448081.00007FF7A41F4000.00000002.00020000.sdmp, mstsc.exe.5.dr
            Source: Binary string: psr.pdb source: psr.exe.5.dr
            Source: Binary string: RDVGHelper.pdb source: RDVGHelper.exe.5.dr
            Source: Binary string: DevicePairingWizard.pdbGCTL source: DevicePairingWizard.exe, 00000023.00000000.476451806.00007FF6CB027000.00000002.00020000.sdmp, DevicePairingWizard.exe.5.dr
            Source: Binary string: WerMgr.pdbGCTL source: wermgr.exe, 00000026.00000000.503200153.00007FF776FB5000.00000002.00020000.sdmp, wermgr.exe.5.dr
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140056A4D push rdi; ret 0_2_0000000140056A4E
            Source: DC2zX44MQr.dllStatic PE information: section name: .qkm
            Source: DC2zX44MQr.dllStatic PE information: section name: .cvjb
            Source: DC2zX44MQr.dllStatic PE information: section name: .tlmkv
            Source: DC2zX44MQr.dllStatic PE information: section name: .wucsxe
            Source: DC2zX44MQr.dllStatic PE information: section name: .wnx
            Source: DC2zX44MQr.dllStatic PE information: section name: .weqy
            Source: DC2zX44MQr.dllStatic PE information: section name: .yby
            Source: DC2zX44MQr.dllStatic PE information: section name: .ormx
            Source: DC2zX44MQr.dllStatic PE information: section name: .dhclu
            Source: DC2zX44MQr.dllStatic PE information: section name: .xmiul
            Source: DC2zX44MQr.dllStatic PE information: section name: .tlwcxe
            Source: DC2zX44MQr.dllStatic PE information: section name: .get
            Source: DC2zX44MQr.dllStatic PE information: section name: .hzrd
            Source: DC2zX44MQr.dllStatic PE information: section name: .qzu
            Source: DC2zX44MQr.dllStatic PE information: section name: .nhglos
            Source: DC2zX44MQr.dllStatic PE information: section name: .itzo
            Source: DC2zX44MQr.dllStatic PE information: section name: .nmsaom
            Source: DC2zX44MQr.dllStatic PE information: section name: .rvhi
            Source: DC2zX44MQr.dllStatic PE information: section name: .ucrzce
            Source: DC2zX44MQr.dllStatic PE information: section name: .ijc
            Source: DC2zX44MQr.dllStatic PE information: section name: .ohvs
            Source: DC2zX44MQr.dllStatic PE information: section name: .rlvrc
            Source: DC2zX44MQr.dllStatic PE information: section name: .yjv
            Source: DC2zX44MQr.dllStatic PE information: section name: .clbcyy
            Source: DC2zX44MQr.dllStatic PE information: section name: .xcyn
            Source: DC2zX44MQr.dllStatic PE information: section name: .boqx
            Source: DC2zX44MQr.dllStatic PE information: section name: .rnlia
            Source: DC2zX44MQr.dllStatic PE information: section name: .ctip
            Source: DC2zX44MQr.dllStatic PE information: section name: .fkv
            Source: DC2zX44MQr.dllStatic PE information: section name: .pczrv
            Source: DC2zX44MQr.dllStatic PE information: section name: .ibglr
            Source: DC2zX44MQr.dllStatic PE information: section name: .uirkq
            Source: DC2zX44MQr.dllStatic PE information: section name: .xmo
            Source: DmNotificationBroker.exe.5.drStatic PE information: section name: .imrsiv
            Source: Utilman.exe.5.drStatic PE information: section name: .imrsiv
            Source: wermgr.exe.5.drStatic PE information: section name: .imrsiv
            Source: wermgr.exe.5.drStatic PE information: section name: .didat
            Source: mstsc.exe.5.drStatic PE information: section name: .didat
            Source: PasswordOnWakeSettingFlyout.exe.5.drStatic PE information: section name: .imrsiv
            Source: psr.exe.5.drStatic PE information: section name: .didat
            Source: DUI70.dll.5.drStatic PE information: section name: .qkm
            Source: DUI70.dll.5.drStatic PE information: section name: .cvjb
            Source: DUI70.dll.5.drStatic PE information: section name: .tlmkv
            Source: DUI70.dll.5.drStatic PE information: section name: .wucsxe
            Source: DUI70.dll.5.drStatic PE information: section name: .wnx
            Source: DUI70.dll.5.drStatic PE information: section name: .weqy
            Source: DUI70.dll.5.drStatic PE information: section name: .yby
            Source: DUI70.dll.5.drStatic PE information: section name: .ormx
            Source: DUI70.dll.5.drStatic PE information: section name: .dhclu
            Source: DUI70.dll.5.drStatic PE information: section name: .xmiul
            Source: DUI70.dll.5.drStatic PE information: section name: .tlwcxe
            Source: DUI70.dll.5.drStatic PE information: section name: .get
            Source: DUI70.dll.5.drStatic PE information: section name: .hzrd
            Source: DUI70.dll.5.drStatic PE information: section name: .qzu
            Source: DUI70.dll.5.drStatic PE information: section name: .nhglos
            Source: DUI70.dll.5.drStatic PE information: section name: .itzo
            Source: DUI70.dll.5.drStatic PE information: section name: .nmsaom
            Source: DUI70.dll.5.drStatic PE information: section name: .rvhi
            Source: DUI70.dll.5.drStatic PE information: section name: .ucrzce
            Source: DUI70.dll.5.drStatic PE information: section name: .ijc
            Source: DUI70.dll.5.drStatic PE information: section name: .ohvs
            Source: DUI70.dll.5.drStatic PE information: section name: .rlvrc
            Source: DUI70.dll.5.drStatic PE information: section name: .yjv
            Source: DUI70.dll.5.drStatic PE information: section name: .clbcyy
            Source: DUI70.dll.5.drStatic PE information: section name: .xcyn
            Source: DUI70.dll.5.drStatic PE information: section name: .boqx
            Source: DUI70.dll.5.drStatic PE information: section name: .rnlia
            Source: DUI70.dll.5.drStatic PE information: section name: .ctip
            Source: DUI70.dll.5.drStatic PE information: section name: .fkv
            Source: DUI70.dll.5.drStatic PE information: section name: .pczrv
            Source: DUI70.dll.5.drStatic PE information: section name: .ibglr
            Source: DUI70.dll.5.drStatic PE information: section name: .uirkq
            Source: DUI70.dll.5.drStatic PE information: section name: .xmo
            Source: DUI70.dll.5.drStatic PE information: section name: .req
            Source: WINSTA.dll.5.drStatic PE information: section name: .qkm
            Source: WINSTA.dll.5.drStatic PE information: section name: .cvjb
            Source: WINSTA.dll.5.drStatic PE information: section name: .tlmkv
            Source: WINSTA.dll.5.drStatic PE information: section name: .wucsxe
            Source: WINSTA.dll.5.drStatic PE information: section name: .wnx
            Source: WINSTA.dll.5.drStatic PE information: section name: .weqy
            Source: WINSTA.dll.5.drStatic PE information: section name: .yby
            Source: WINSTA.dll.5.drStatic PE information: section name: .ormx
            Source: WINSTA.dll.5.drStatic PE information: section name: .dhclu
            Source: WINSTA.dll.5.drStatic PE information: section name: .xmiul
            Source: WINSTA.dll.5.drStatic PE information: section name: .tlwcxe
            Source: WINSTA.dll.5.drStatic PE information: section name: .get
            Source: WINSTA.dll.5.drStatic PE information: section name: .hzrd
            Source: WINSTA.dll.5.drStatic PE information: section name: .qzu
            Source: WINSTA.dll.5.drStatic PE information: section name: .nhglos
            Source: WINSTA.dll.5.drStatic PE information: section name: .itzo
            Source: WINSTA.dll.5.drStatic PE information: section name: .nmsaom
            Source: WINSTA.dll.5.drStatic PE information: section name: .rvhi
            Source: WINSTA.dll.5.drStatic PE information: section name: .ucrzce
            Source: WINSTA.dll.5.drStatic PE information: section name: .ijc
            Source: WINSTA.dll.5.drStatic PE information: section name: .ohvs
            Source: WINSTA.dll.5.drStatic PE information: section name: .rlvrc
            Source: WINSTA.dll.5.drStatic PE information: section name: .yjv
            Source: WINSTA.dll.5.drStatic PE information: section name: .clbcyy
            Source: WINSTA.dll.5.drStatic PE information: section name: .xcyn
            Source: WINSTA.dll.5.drStatic PE information: section name: .boqx
            Source: WINSTA.dll.5.drStatic PE information: section name: .rnlia
            Source: WINSTA.dll.5.drStatic PE information: section name: .ctip
            Source: WINSTA.dll.5.drStatic PE information: section name: .fkv
            Source: WINSTA.dll.5.drStatic PE information: section name: .pczrv
            Source: WINSTA.dll.5.drStatic PE information: section name: .ibglr
            Source: WINSTA.dll.5.drStatic PE information: section name: .uirkq
            Source: WINSTA.dll.5.drStatic PE information: section name: .xmo
            Source: WINSTA.dll.5.drStatic PE information: section name: .jki
            Source: DUI70.dll0.5.drStatic PE information: section name: .qkm
            Source: DUI70.dll0.5.drStatic PE information: section name: .cvjb
            Source: DUI70.dll0.5.drStatic PE information: section name: .tlmkv
            Source: DUI70.dll0.5.drStatic PE information: section name: .wucsxe
            Source: DUI70.dll0.5.drStatic PE information: section name: .wnx
            Source: DUI70.dll0.5.drStatic PE information: section name: .weqy
            Source: DUI70.dll0.5.drStatic PE information: section name: .yby
            Source: DUI70.dll0.5.drStatic PE information: section name: .ormx
            Source: DUI70.dll0.5.drStatic PE information: section name: .dhclu
            Source: DUI70.dll0.5.drStatic PE information: section name: .xmiul
            Source: DUI70.dll0.5.drStatic PE information: section name: .tlwcxe
            Source: DUI70.dll0.5.drStatic PE information: section name: .get
            Source: DUI70.dll0.5.drStatic PE information: section name: .hzrd
            Source: DUI70.dll0.5.drStatic PE information: section name: .qzu
            Source: DUI70.dll0.5.drStatic PE information: section name: .nhglos
            Source: DUI70.dll0.5.drStatic PE information: section name: .itzo
            Source: DUI70.dll0.5.drStatic PE information: section name: .nmsaom
            Source: DUI70.dll0.5.drStatic PE information: section name: .rvhi
            Source: DUI70.dll0.5.drStatic PE information: section name: .ucrzce
            Source: DUI70.dll0.5.drStatic PE information: section name: .ijc
            Source: DUI70.dll0.5.drStatic PE information: section name: .ohvs
            Source: DUI70.dll0.5.drStatic PE information: section name: .rlvrc
            Source: DUI70.dll0.5.drStatic PE information: section name: .yjv
            Source: DUI70.dll0.5.drStatic PE information: section name: .clbcyy
            Source: DUI70.dll0.5.drStatic PE information: section name: .xcyn
            Source: DUI70.dll0.5.drStatic PE information: section name: .boqx
            Source: DUI70.dll0.5.drStatic PE information: section name: .rnlia
            Source: DUI70.dll0.5.drStatic PE information: section name: .ctip
            Source: DUI70.dll0.5.drStatic PE information: section name: .fkv
            Source: DUI70.dll0.5.drStatic PE information: section name: .pczrv
            Source: DUI70.dll0.5.drStatic PE information: section name: .ibglr
            Source: DUI70.dll0.5.drStatic PE information: section name: .uirkq
            Source: DUI70.dll0.5.drStatic PE information: section name: .xmo
            Source: DUI70.dll0.5.drStatic PE information: section name: .oni
            Source: OLEACC.dll.5.drStatic PE information: section name: .qkm
            Source: OLEACC.dll.5.drStatic PE information: section name: .cvjb
            Source: OLEACC.dll.5.drStatic PE information: section name: .tlmkv
            Source: OLEACC.dll.5.drStatic PE information: section name: .wucsxe
            Source: OLEACC.dll.5.drStatic PE information: section name: .wnx
            Source: OLEACC.dll.5.drStatic PE information: section name: .weqy
            Source: OLEACC.dll.5.drStatic PE information: section name: .yby
            Source: OLEACC.dll.5.drStatic PE information: section name: .ormx
            Source: OLEACC.dll.5.drStatic PE information: section name: .dhclu
            Source: OLEACC.dll.5.drStatic PE information: section name: .xmiul
            Source: OLEACC.dll.5.drStatic PE information: section name: .tlwcxe
            Source: OLEACC.dll.5.drStatic PE information: section name: .get
            Source: OLEACC.dll.5.drStatic PE information: section name: .hzrd
            Source: OLEACC.dll.5.drStatic PE information: section name: .qzu
            Source: OLEACC.dll.5.drStatic PE information: section name: .nhglos
            Source: OLEACC.dll.5.drStatic PE information: section name: .itzo
            Source: OLEACC.dll.5.drStatic PE information: section name: .nmsaom
            Source: OLEACC.dll.5.drStatic PE information: section name: .rvhi
            Source: OLEACC.dll.5.drStatic PE information: section name: .ucrzce
            Source: OLEACC.dll.5.drStatic PE information: section name: .ijc
            Source: OLEACC.dll.5.drStatic PE information: section name: .ohvs
            Source: OLEACC.dll.5.drStatic PE information: section name: .rlvrc
            Source: OLEACC.dll.5.drStatic PE information: section name: .yjv
            Source: OLEACC.dll.5.drStatic PE information: section name: .clbcyy
            Source: OLEACC.dll.5.drStatic PE information: section name: .xcyn
            Source: OLEACC.dll.5.drStatic PE information: section name: .boqx
            Source: OLEACC.dll.5.drStatic PE information: section name: .rnlia
            Source: OLEACC.dll.5.drStatic PE information: section name: .ctip
            Source: OLEACC.dll.5.drStatic PE information: section name: .fkv
            Source: OLEACC.dll.5.drStatic PE information: section name: .pczrv
            Source: OLEACC.dll.5.drStatic PE information: section name: .ibglr
            Source: OLEACC.dll.5.drStatic PE information: section name: .uirkq
            Source: OLEACC.dll.5.drStatic PE information: section name: .xmo
            Source: OLEACC.dll.5.drStatic PE information: section name: .nncdb
            Source: MFC42u.dll.5.drStatic PE information: section name: .qkm
            Source: MFC42u.dll.5.drStatic PE information: section name: .cvjb
            Source: MFC42u.dll.5.drStatic PE information: section name: .tlmkv
            Source: MFC42u.dll.5.drStatic PE information: section name: .wucsxe
            Source: MFC42u.dll.5.drStatic PE information: section name: .wnx
            Source: MFC42u.dll.5.drStatic PE information: section name: .weqy
            Source: MFC42u.dll.5.drStatic PE information: section name: .yby
            Source: MFC42u.dll.5.drStatic PE information: section name: .ormx
            Source: MFC42u.dll.5.drStatic PE information: section name: .dhclu
            Source: MFC42u.dll.5.drStatic PE information: section name: .xmiul
            Source: MFC42u.dll.5.drStatic PE information: section name: .tlwcxe
            Source: MFC42u.dll.5.drStatic PE information: section name: .get
            Source: MFC42u.dll.5.drStatic PE information: section name: .hzrd
            Source: MFC42u.dll.5.drStatic PE information: section name: .qzu
            Source: MFC42u.dll.5.drStatic PE information: section name: .nhglos
            Source: MFC42u.dll.5.drStatic PE information: section name: .itzo
            Source: MFC42u.dll.5.drStatic PE information: section name: .nmsaom
            Source: MFC42u.dll.5.drStatic PE information: section name: .rvhi
            Source: MFC42u.dll.5.drStatic PE information: section name: .ucrzce
            Source: MFC42u.dll.5.drStatic PE information: section name: .ijc
            Source: MFC42u.dll.5.drStatic PE information: section name: .ohvs
            Source: MFC42u.dll.5.drStatic PE information: section name: .rlvrc
            Source: MFC42u.dll.5.drStatic PE information: section name: .yjv
            Source: MFC42u.dll.5.drStatic PE information: section name: .clbcyy
            Source: MFC42u.dll.5.drStatic PE information: section name: .xcyn
            Source: MFC42u.dll.5.drStatic PE information: section name: .boqx
            Source: MFC42u.dll.5.drStatic PE information: section name: .rnlia
            Source: MFC42u.dll.5.drStatic PE information: section name: .ctip
            Source: MFC42u.dll.5.drStatic PE information: section name: .fkv
            Source: MFC42u.dll.5.drStatic PE information: section name: .pczrv
            Source: MFC42u.dll.5.drStatic PE information: section name: .ibglr
            Source: MFC42u.dll.5.drStatic PE information: section name: .uirkq
            Source: MFC42u.dll.5.drStatic PE information: section name: .xmo
            Source: MFC42u.dll.5.drStatic PE information: section name: .nhpi
            Source: wer.dll.5.drStatic PE information: section name: .qkm
            Source: wer.dll.5.drStatic PE information: section name: .cvjb
            Source: wer.dll.5.drStatic PE information: section name: .tlmkv
            Source: wer.dll.5.drStatic PE information: section name: .wucsxe
            Source: wer.dll.5.drStatic PE information: section name: .wnx
            Source: wer.dll.5.drStatic PE information: section name: .weqy
            Source: wer.dll.5.drStatic PE information: section name: .yby
            Source: wer.dll.5.drStatic PE information: section name: .ormx
            Source: wer.dll.5.drStatic PE information: section name: .dhclu
            Source: wer.dll.5.drStatic PE information: section name: .xmiul
            Source: wer.dll.5.drStatic PE information: section name: .tlwcxe
            Source: wer.dll.5.drStatic PE information: section name: .get
            Source: wer.dll.5.drStatic PE information: section name: .hzrd
            Source: wer.dll.5.drStatic PE information: section name: .qzu
            Source: wer.dll.5.drStatic PE information: section name: .nhglos
            Source: wer.dll.5.drStatic PE information: section name: .itzo
            Source: wer.dll.5.drStatic PE information: section name: .nmsaom
            Source: wer.dll.5.drStatic PE information: section name: .rvhi
            Source: wer.dll.5.drStatic PE information: section name: .ucrzce
            Source: wer.dll.5.drStatic PE information: section name: .ijc
            Source: wer.dll.5.drStatic PE information: section name: .ohvs
            Source: wer.dll.5.drStatic PE information: section name: .rlvrc
            Source: wer.dll.5.drStatic PE information: section name: .yjv
            Source: wer.dll.5.drStatic PE information: section name: .clbcyy
            Source: wer.dll.5.drStatic PE information: section name: .xcyn
            Source: wer.dll.5.drStatic PE information: section name: .boqx
            Source: wer.dll.5.drStatic PE information: section name: .rnlia
            Source: wer.dll.5.drStatic PE information: section name: .ctip
            Source: wer.dll.5.drStatic PE information: section name: .fkv
            Source: wer.dll.5.drStatic PE information: section name: .pczrv
            Source: wer.dll.5.drStatic PE information: section name: .ibglr
            Source: wer.dll.5.drStatic PE information: section name: .uirkq
            Source: wer.dll.5.drStatic PE information: section name: .xmo
            Source: wer.dll.5.drStatic PE information: section name: .hrnn
            Source: credui.dll.5.drStatic PE information: section name: .qkm
            Source: credui.dll.5.drStatic PE information: section name: .cvjb
            Source: credui.dll.5.drStatic PE information: section name: .tlmkv
            Source: credui.dll.5.drStatic PE information: section name: .wucsxe
            Source: credui.dll.5.drStatic PE information: section name: .wnx
            Source: credui.dll.5.drStatic PE information: section name: .weqy
            Source: credui.dll.5.drStatic PE information: section name: .yby
            Source: credui.dll.5.drStatic PE information: section name: .ormx
            Source: credui.dll.5.drStatic PE information: section name: .dhclu
            Source: credui.dll.5.drStatic PE information: section name: .xmiul
            Source: credui.dll.5.drStatic PE information: section name: .tlwcxe
            Source: credui.dll.5.drStatic PE information: section name: .get
            Source: credui.dll.5.drStatic PE information: section name: .hzrd
            Source: credui.dll.5.drStatic PE information: section name: .qzu
            Source: credui.dll.5.drStatic PE information: section name: .nhglos
            Source: credui.dll.5.drStatic PE information: section name: .itzo
            Source: credui.dll.5.drStatic PE information: section name: .nmsaom
            Source: credui.dll.5.drStatic PE information: section name: .rvhi
            Source: credui.dll.5.drStatic PE information: section name: .ucrzce
            Source: credui.dll.5.drStatic PE information: section name: .ijc
            Source: credui.dll.5.drStatic PE information: section name: .ohvs
            Source: credui.dll.5.drStatic PE information: section name: .rlvrc
            Source: credui.dll.5.drStatic PE information: section name: .yjv
            Source: credui.dll.5.drStatic PE information: section name: .clbcyy
            Source: credui.dll.5.drStatic PE information: section name: .xcyn
            Source: credui.dll.5.drStatic PE information: section name: .boqx
            Source: credui.dll.5.drStatic PE information: section name: .rnlia
            Source: credui.dll.5.drStatic PE information: section name: .ctip
            Source: credui.dll.5.drStatic PE information: section name: .fkv
            Source: credui.dll.5.drStatic PE information: section name: .pczrv
            Source: credui.dll.5.drStatic PE information: section name: .ibglr
            Source: credui.dll.5.drStatic PE information: section name: .uirkq
            Source: credui.dll.5.drStatic PE information: section name: .xmo
            Source: credui.dll.5.drStatic PE information: section name: .efn
            Source: DUI70.dll1.5.drStatic PE information: section name: .qkm
            Source: DUI70.dll1.5.drStatic PE information: section name: .cvjb
            Source: DUI70.dll1.5.drStatic PE information: section name: .tlmkv
            Source: DUI70.dll1.5.drStatic PE information: section name: .wucsxe
            Source: DUI70.dll1.5.drStatic PE information: section name: .wnx
            Source: DUI70.dll1.5.drStatic PE information: section name: .weqy
            Source: DUI70.dll1.5.drStatic PE information: section name: .yby
            Source: DUI70.dll1.5.drStatic PE information: section name: .ormx
            Source: DUI70.dll1.5.drStatic PE information: section name: .dhclu
            Source: DUI70.dll1.5.drStatic PE information: section name: .xmiul
            Source: DUI70.dll1.5.drStatic PE information: section name: .tlwcxe
            Source: DUI70.dll1.5.drStatic PE information: section name: .get
            Source: DUI70.dll1.5.drStatic PE information: section name: .hzrd
            Source: DUI70.dll1.5.drStatic PE information: section name: .qzu
            Source: DUI70.dll1.5.drStatic PE information: section name: .nhglos
            Source: DUI70.dll1.5.drStatic PE information: section name: .itzo
            Source: DUI70.dll1.5.drStatic PE information: section name: .nmsaom
            Source: DUI70.dll1.5.drStatic PE information: section name: .rvhi
            Source: DUI70.dll1.5.drStatic PE information: section name: .ucrzce
            Source: DUI70.dll1.5.drStatic PE information: section name: .ijc
            Source: DUI70.dll1.5.drStatic PE information: section name: .ohvs
            Source: DUI70.dll1.5.drStatic PE information: section name: .rlvrc
            Source: DUI70.dll1.5.drStatic PE information: section name: .yjv
            Source: DUI70.dll1.5.drStatic PE information: section name: .clbcyy
            Source: DUI70.dll1.5.drStatic PE information: section name: .xcyn
            Source: DUI70.dll1.5.drStatic PE information: section name: .boqx
            Source: DUI70.dll1.5.drStatic PE information: section name: .rnlia
            Source: DUI70.dll1.5.drStatic PE information: section name: .ctip
            Source: DUI70.dll1.5.drStatic PE information: section name: .fkv
            Source: DUI70.dll1.5.drStatic PE information: section name: .pczrv
            Source: DUI70.dll1.5.drStatic PE information: section name: .ibglr
            Source: DUI70.dll1.5.drStatic PE information: section name: .uirkq
            Source: DUI70.dll1.5.drStatic PE information: section name: .xmo
            Source: DUI70.dll1.5.drStatic PE information: section name: .udkto
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .qkm
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .cvjb
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .tlmkv
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .wucsxe
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .wnx
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .weqy
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .yby
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .ormx
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .dhclu
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .xmiul
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .tlwcxe
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .get
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .hzrd
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .qzu
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .nhglos
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .itzo
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .nmsaom
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .rvhi
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .ucrzce
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .ijc
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .ohvs
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .rlvrc
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .yjv
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .clbcyy
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .xcyn
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .boqx
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .rnlia
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .ctip
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .fkv
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .pczrv
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .ibglr
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .uirkq
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .xmo
            Source: WTSAPI32.dll.5.drStatic PE information: section name: .fmi
            Source: VERSION.dll.5.drStatic PE information: section name: .qkm
            Source: VERSION.dll.5.drStatic PE information: section name: .cvjb
            Source: VERSION.dll.5.drStatic PE information: section name: .tlmkv
            Source: VERSION.dll.5.drStatic PE information: section name: .wucsxe
            Source: VERSION.dll.5.drStatic PE information: section name: .wnx
            Source: VERSION.dll.5.drStatic PE information: section name: .weqy
            Source: VERSION.dll.5.drStatic PE information: section name: .yby
            Source: VERSION.dll.5.drStatic PE information: section name: .ormx
            Source: VERSION.dll.5.drStatic PE information: section name: .dhclu
            Source: VERSION.dll.5.drStatic PE information: section name: .xmiul
            Source: VERSION.dll.5.drStatic PE information: section name: .tlwcxe
            Source: VERSION.dll.5.drStatic PE information: section name: .get
            Source: VERSION.dll.5.drStatic PE information: section name: .hzrd
            Source: VERSION.dll.5.drStatic PE information: section name: .qzu
            Source: VERSION.dll.5.drStatic PE information: section name: .nhglos
            Source: VERSION.dll.5.drStatic PE information: section name: .itzo
            Source: VERSION.dll.5.drStatic PE information: section name: .nmsaom
            Source: VERSION.dll.5.drStatic PE information: section name: .rvhi
            Source: VERSION.dll.5.drStatic PE information: section name: .ucrzce
            Source: VERSION.dll.5.drStatic PE information: section name: .ijc
            Source: VERSION.dll.5.drStatic PE information: section name: .ohvs
            Source: VERSION.dll.5.drStatic PE information: section name: .rlvrc
            Source: VERSION.dll.5.drStatic PE information: section name: .yjv
            Source: VERSION.dll.5.drStatic PE information: section name: .clbcyy
            Source: VERSION.dll.5.drStatic PE information: section name: .xcyn
            Source: VERSION.dll.5.drStatic PE information: section name: .boqx
            Source: VERSION.dll.5.drStatic PE information: section name: .rnlia
            Source: VERSION.dll.5.drStatic PE information: section name: .ctip
            Source: VERSION.dll.5.drStatic PE information: section name: .fkv
            Source: VERSION.dll.5.drStatic PE information: section name: .pczrv
            Source: VERSION.dll.5.drStatic PE information: section name: .ibglr
            Source: VERSION.dll.5.drStatic PE information: section name: .uirkq
            Source: VERSION.dll.5.drStatic PE information: section name: .xmo
            Source: VERSION.dll.5.drStatic PE information: section name: .okbt
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40EBEA0 LoadLibraryW,GetProcAddress,GetProcAddress,40_2_00007FF7A40EBEA0
            Source: DUI70.dll0.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x18312b
            Source: DUI70.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x17960c
            Source: WTSAPI32.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x130bc3
            Source: DC2zX44MQr.dllStatic PE information: real checksum: 0x7d786c40 should be: 0x136b0f
            Source: WINSTA.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1382ec
            Source: wer.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x135c0e
            Source: DUI70.dll1.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x175fcb
            Source: VERSION.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x13d91d
            Source: credui.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1357c2
            Source: MFC42u.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1426da
            Source: OLEACC.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x13ea9a
            Source: DmNotificationBroker.exe.5.drStatic PE information: 0xF8A808F8 [Tue Mar 14 06:45:12 2102 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\zLYZkwYH\WINSTA.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\rm4w0\OLEACC.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\mJLa\MFC42u.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\EwdQnyo\DUI70.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\sBx0fm\VERSION.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\pZCYq8TUy\credui.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\bQkmObl\RDVGHelper.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\sBx0fm\psr.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\KbLvcSLVf\DUI70.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\WkAB\DUI70.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\WkAB\PasswordOnWakeSettingFlyout.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\xlPP\wermgr.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\xlPP\wer.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A415C560 GetWindowRect,IsWindow,IsIconic,GetSystemMetrics,GetSystemMetrics,GetWindowRect,PtInRect,PtInRect,SystemParametersInfoW,CopyRect,SetWindowPos,40_2_00007FF7A415C560
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40DF5A4 DefWindowProcW,IsIconic,GetClientRect,GetLastError,VariantClear,DefWindowProcW,40_2_00007FF7A40DF5A4
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E39A0 SetFocus,LoadCursorW,SetCursor,DefWindowProcW,GetClientRect,IsIconic,memset,GetTitleBarInfo,GetCursorPos,SendMessageW,40_2_00007FF7A40E39A0
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40DCE48 IsIconic,GetWindowPlacement,GetLastError,40_2_00007FF7A40DCE48
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40D9A6C IsIconic,GetWindowPlacement,GetWindowRect,40_2_00007FF7A40D9A6C
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40DCF28 IsIconic,GetWindowPlacement,GetLastError,IsZoomed,SetWindowPlacement,GetLastError,SetWindowPos,SetWindowPos,GetClientRect,MoveWindow,40_2_00007FF7A40DCF28
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E1B44 lstrcmpW,LockWindowUpdate,IsIconic,GetWindowPlacement,GetWindowLongW,SetWindowLongW,SetWindowLongW,VariantInit,VariantClear,GetRgnBox,OffsetRgn,VariantClear,ShowWindow,SetWindowPos,SetWindowPos,SetWindowRgn,LockWindowUpdate,40_2_00007FF7A40E1B44
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E2F5C IsWindowVisible,IsIconic,40_2_00007FF7A40E2F5C
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E2884 GetWindowRect,GetWindowLongW,GetWindowLongW,memset,CopyRect,IntersectRect,MoveWindow,IsIconic,memset,GetWindowPlacement,40_2_00007FF7A40E2884
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40E04F8 IsZoomed,IsIconic,EnableMenuItem,EnableMenuItem,EnableMenuItem,EnableMenuItem,EnableMenuItem,EnableMenuItem,40_2_00007FF7A40E04F8
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exe TID: 4492Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\sBx0fm\VERSION.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\bQkmObl\RDVGHelper.exeJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\sBx0fm\psr.exeJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\WkAB\PasswordOnWakeSettingFlyout.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FA7BC4 GetSystemTimeAsFileTime followed by cmp: cmp ebx, 01h and CTI: jne 00007FF776FA7CE0h38_2_00007FF776FA7BC4
            Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005C340 GetSystemInfo,0_2_000000014005C340
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005D290 FindFirstFileExW,0_2_000000014005D290
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FABE54 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,CompareStringW,FindNextFileW,FindClose,FindClose,38_2_00007FF776FABE54
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB1BA0 FindFirstFileExW,_wcsicmp,_wcsicmp,FindNextFileW,GetLastError,GetLastError,FindClose,38_2_00007FF776FB1BA0
            Source: explorer.exe, 00000005.00000000.272660584.0000000008A32000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: explorer.exe, 00000005.00000000.272660584.0000000008A32000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 00000005.00000000.261174760.000000000E9FF000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.259807605.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.259807605.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: explorer.exe, 00000005.00000000.268107178.00000000048E0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.259807605.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
            Source: explorer.exe, 00000005.00000000.272937253.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
            Source: explorer.exe, 00000005.00000000.272937253.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 00000005.00000000.269963872.00000000069DA000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD002
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeCode function: 35_2_00007FF6CB022110 GetCurrentThreadId,memset,IsDebuggerPresent,OutputDebugStringW,35_2_00007FF6CB022110
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A40EBEA0 LoadLibraryW,GetProcAddress,GetProcAddress,40_2_00007FF7A40EBEA0
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D51124 SysFreeString,GetProcessHeap,HeapFree,25_2_00007FF644D51124
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140048AC0 LdrLoadDll,FindClose,0_2_0000000140048AC0
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeCode function: 19_2_00007FF686902780 SetUnhandledExceptionFilter,19_2_00007FF686902780
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeCode function: 19_2_00007FF686902AB4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00007FF686902AB4
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D57330 SetUnhandledExceptionFilter,25_2_00007FF644D57330
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D575B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00007FF644D575B4
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984CD10 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,28_2_00007FF71984CD10
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984CF30 SetUnhandledExceptionFilter,28_2_00007FF71984CF30
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C3C98C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,33_2_00007FF792C3C98C
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C3C710 SetUnhandledExceptionFilter,33_2_00007FF792C3C710
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeCode function: 35_2_00007FF6CB026340 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,35_2_00007FF6CB026340
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeCode function: 35_2_00007FF6CB026630 SetUnhandledExceptionFilter,35_2_00007FF6CB026630
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB2B00 SetUnhandledExceptionFilter,38_2_00007FF776FB2B00
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FB3140 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_00007FF776FB3140
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A41F2264 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_00007FF7A41F2264

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\explorer.exeFile created: DUI70.dll.5.drJump to dropped file
            Changes memory attributes in foreign processes to executable or writableShow sources
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFFAE1CEFE0 protect: page execute and read and writeJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFFAE1CE000 protect: page execute readJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFFAC2B2A20 protect: page execute and read and writeJump to behavior
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
            Uses Atom Bombing / ProGate to inject into other processesShow sources
            Source: C:\Windows\System32\rundll32.exeAtom created: 405553565741544156488D6C24D14881EC98 0x00000000 inc eax 0x00000001 push ebp 0x00000002 push ebx 0x00000003 push esi 0x00000004 push edi 0x00000005 inc ecx 0x00000006 push esp 0x00000007 inc ecx 0x00000008 push esi 0x00000009 dec eax 0x0000000a lea ebp, dword ptr [esp-2Fh] 0x0000000e dec eax 0x0000000f sub esp, 00000098h Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1Jump to behavior
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeCode function: 38_2_00007FF776FAAE50 GetFileSecurityW,GetLastError,GetFileSecurityW,GetLastError,GetSecurityDescriptorDacl,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetLastError,GetTokenInformation,GetLastError,SetEntriesInAclW,InitializeSecurityDescriptor,GetLastError,SetSecurityDescriptorDacl,GetLastError,SetFileSecurityW,GetLastError,GetFileAttributesW,GetLastError,SetFileAttributesW,GetLastError,LocalFree,CloseHandle,38_2_00007FF776FAAE50
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF7198450A4 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,28_2_00007FF7198450A4
            Source: explorer.exe, 00000005.00000000.253485246.0000000001400000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
            Source: explorer.exe, 00000005.00000000.286145376.0000000005F40000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000005.00000000.253485246.0000000001400000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000005.00000000.265800620.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: ProgmanX
            Source: explorer.exe, 00000005.00000000.253485246.0000000001400000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 00000005.00000000.272937253.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndAj
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeQueries volume information: unknown VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\xlPP\wermgr.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: GetThreadPreferredUILanguages,GetLastError,GetThreadPreferredUILanguages,GetLastError,GetLocaleInfoEx,GetLastError,28_2_00007FF7198498E8
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: GetThreadPreferredUILanguages,GetLastError,GetThreadPreferredUILanguages,GetLastError,GetLocaleInfoEx,GetLastError,33_2_00007FF792C32EA8
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeCode function: 19_2_00007FF686902910 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,19_2_00007FF686902910
            Source: C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exeCode function: 40_2_00007FF7A41EF5EC memset,GetVersionExW,GetVersionExW,40_2_00007FF7A41EF5EC
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D54A50 GetUserNameExW,GetLastError,GetUserNameExW,GetLastError,25_2_00007FF644D54A50
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeCode function: 19_2_00007FF6869021B8 RpcBindingCreateW,RpcBindingBind,NdrClientCall3,RpcBindingFree,19_2_00007FF6869021B8
            Source: C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exeCode function: 19_2_00007FF6869022F0 RpcBindingFree,19_2_00007FF6869022F0
            Source: C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exeCode function: 25_2_00007FF644D56AB4 memset,CreateBindCtx,StringFromCLSID,MkParseDisplayName,CoTaskMemFree,25_2_00007FF644D56AB4
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984B230 InitProcessPriv,InitThread,RegisterPVLBehaviorFactory,UnInitThread,UnInitProcessPriv,?Create@DUIXmlParser@DirectUI@@SAJPEAPEAV12@P6APEAVValue@2@PEBGPEAX@Z2P6AX11H2@Z2@Z,?SetXMLFromResource@DUIXmlParser@DirectUI@@QEAAJIPEAUHINSTANCE__@@0@Z,?CreateElement@DUIXmlParser@DirectUI@@QEAAJPEBGPEAVElement@2@1PEAKPEAPEAV32@@Z,?SetVisible@Element@DirectUI@@QEAAJ_N@Z,?SetAccessible@Element@DirectUI@@QEAAJ_N@Z,?GetRoot@Element@DirectUI@@QEAAPEAV12@XZ,?GetClassInfoPtr@HWNDElement@DirectUI@@SAPEAUIClassInfo@2@XZ,GetAncestor,SetWindowPos,AccessibleObjectFromWindow,new,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,new,LoadCursorW,SetCursor,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StartMessagePump,?RemoveListener@Element@DirectUI@@QEAAXPEAUIElementListener@2@@Z,?Destroy@Element@DirectUI@@QEAAJ_N@Z,?Destroy@DUIXmlParser@DirectUI@@QEAAXXZ,UnInitThread,UnInitProcessPriv,28_2_00007FF71984B230
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984A8A0 StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,?Click@TouchButton@DirectUI@@SA?AVUID@@XZ,StrToID,StrToID,StrToID,?SliderUpdated@TouchSlider@DirectUI@@SA?AVUID@@XZ,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?IsDescendent@Element@DirectUI@@QEAA_NPEAV12@@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?OnEvent@Element@DirectUI@@UEAAXPEAUEvent@2@@Z,28_2_00007FF71984A8A0
            Source: C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exeCode function: 28_2_00007FF71984C7B0 ?RemoveListener@Element@DirectUI@@QEAAXPEAUIElementListener@2@@Z,free,28_2_00007FF71984C7B0
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C35B60 ?RemoveListener@Element@DirectUI@@QEAAXPEAUIElementListener@2@@Z,free,33_2_00007FF792C35B60
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C34830 InitProcessPriv,InitThread,RegisterPVLBehaviorFactory,UnInitThread,UnInitProcessPriv,?Create@DUIXmlParser@DirectUI@@SAJPEAPEAV12@P6APEAVValue@2@PEBGPEAX@Z2P6AX11H2@Z2@Z,?SetXMLFromResource@DUIXmlParser@DirectUI@@QEAAJIPEAUHINSTANCE__@@0@Z,?CreateElement@DUIXmlParser@DirectUI@@QEAAJPEBGPEAVElement@2@1PEAKPEAPEAV32@@Z,?SetVisible@Element@DirectUI@@QEAAJ_N@Z,?SetAccessible@Element@DirectUI@@QEAAJ_N@Z,?GetRoot@Element@DirectUI@@QEAAPEAV12@XZ,?GetClassInfoPtr@HWNDElement@DirectUI@@SAPEAUIClassInfo@2@XZ,GetAncestor,SetWindowPos,AccessibleObjectFromWindow,new,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,new,LoadCursorW,SetCursor,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StartMessagePump,?RemoveListener@Element@DirectUI@@QEAAXPEAUIElementListener@2@@Z,?Destroy@Element@DirectUI@@QEAAJ_N@Z,?Destroy@DUIXmlParser@DirectUI@@QEAAXXZ,UnInitThread,UnInitProcessPriv,33_2_00007FF792C34830
            Source: C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exeCode function: 33_2_00007FF792C33EA4 StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,?Click@TouchButton@DirectUI@@SA?AVUID@@XZ,StrToID,StrToID,StrToID,?SliderUpdated@TouchSlider@DirectUI@@SA?AVUID@@XZ,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?IsDescendent@Element@DirectUI@@QEAA_NPEAV12@@Z,StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?OnEvent@Element@DirectUI@@UEAAXPEAUEvent@2@@Z,33_2_00007FF792C33EA4

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsNative API1Windows Service1Windows Service1Masquerading1Input Capture1System Time Discovery11Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsProcess Injection312Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection312Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsAccount Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsTimestomp1DCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemFile and Directory Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery35Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 492503 Sample: DC2zX44MQr Startdate: 28/09/2021 Architecture: WINDOWS Score: 100 41 Antivirus detection for dropped file 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 3 other signatures 2->47 8 loaddll64.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 rundll32.exe 8->17         started        signatures5 51 Changes memory attributes in foreign processes to executable or writable 10->51 53 Uses Atom Bombing / ProGate to inject into other processes 10->53 55 Queues an APC in another process (thread injection) 10->55 19 explorer.exe 2 61 10->19 injected 23 rundll32.exe 13->23         started        process6 file7 33 C:\Users\user\AppData\Local\...\WINSTA.dll, PE32+ 19->33 dropped 35 C:\Users\user\AppData\Local\xlPP\wer.dll, PE32+ 19->35 dropped 37 C:\Users\user\AppData\Local\...\VERSION.dll, PE32+ 19->37 dropped 39 17 other files (5 malicious) 19->39 dropped 49 Benign windows process drops PE files 19->49 25 EaseOfAccessDialog.exe 19->25         started        27 Utilman.exe 19->27         started        29 RdpSa.exe 19->29         started        31 11 other processes 19->31 signatures8 process9

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            DC2zX44MQr.dll68%VirustotalBrowse
            DC2zX44MQr.dll80%ReversingLabsWin64.Infostealer.Dridex
            DC2zX44MQr.dll100%AviraHEUR/AGEN.1114452
            DC2zX44MQr.dll100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\sBx0fm\VERSION.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\xlPP\wer.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\pZCYq8TUy\credui.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\zLYZkwYH\WINSTA.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\mJLa\MFC42u.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\rm4w0\OLEACC.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\sBx0fm\VERSION.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\xlPP\wer.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\pZCYq8TUy\credui.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\zLYZkwYH\WINSTA.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\mJLa\MFC42u.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\rm4w0\OLEACC.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe0%ReversingLabs
            C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe0%ReversingLabs
            C:\Users\user\AppData\Local\WkAB\PasswordOnWakeSettingFlyout.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\WkAB\PasswordOnWakeSettingFlyout.exe0%ReversingLabs
            C:\Users\user\AppData\Local\bQkmObl\RDVGHelper.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\bQkmObl\RDVGHelper.exe0%ReversingLabs

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            33.2.EaseOfAccessDialog.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            3.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            19.2.DmNotificationBroker.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            6.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            38.2.wermgr.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.loaddll64.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            25.2.RdpSa.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            40.2.mstsc.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            35.2.DevicePairingWizard.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            2.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            8.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            28.2.Utilman.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000005.00000000.301625315.0000000006840000.00000004.00000001.sdmpfalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:492503
              Start date:28.09.2021
              Start time:19:13:08
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 14m 18s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:DC2zX44MQr (renamed file extension from none to dll)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:41
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winDLL@45/21@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 39.2% (good quality ratio 25.9%)
              • Quality average: 52.1%
              • Quality standard deviation: 43.6%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Override analysis time to 240s for rundll32
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
              • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.82.209.183, 209.197.3.8, 20.199.120.85, 20.54.110.249, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.50.102.62, 20.199.120.182
              • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, ris.api.iris.microsoft.com, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtEnumerateKey calls found.

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\EwdQnyo\DUI70.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1523712
              Entropy (8bit):5.861496486431302
              Encrypted:false
              SSDEEP:12288:ZVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1sr:YfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:C63D9096C976C275357356F7A08F8CDE
              SHA1:1C35F2161C931B04E8A41D42C9CD1CA76D8FE41E
              SHA-256:AF746CDAE49B2A4E18F9BCC2517DA92AD8FEED1FE1F4D96EE15B1D6E003C8852
              SHA-512:84944B6F7E59E957437EC02B3E555AC0833163DC1F19EBC0DE518AF89245310E49EF4C87396641C0B41A73E1DF352D4BA8831EDE20AD424365F4AAFC4D8C1346
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ......... ......p..........@.............................@......@lx}..b.............................................dQ...c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):32256
              Entropy (8bit):5.250876383836324
              Encrypted:false
              SSDEEP:768:ghunFhykO4aAvnsvpzte5+Ql0/iqmjjn:58kO4asshu+Q+/Ojjn
              MD5:1643D5735213BC89C0012F0E48253765
              SHA1:D076D701929F1F269D34C8FD7BD1BAB4DAF42A9D
              SHA-256:4176FA24D56BB870316D07BD7211BC8A797394F77DCC12B35FFEBAA0326525D2
              SHA-512:F0BD45FE66EDC6F615C0125C1AE81E657CA26544544769651AB0623DD3C724F96D9D78835EF6B1D15083D1BB9D501F6DC48487DDA5C361CAFA96022D5F33A43F
              Malicious:false
              Antivirus:
              • Antivirus: Virustotal, Detection: 0%, Browse
              • Antivirus: Metadefender, Detection: 0%, Browse
              • Antivirus: ReversingLabs, Detection: 0%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........j.?H..lH..lH..lAs.lT..l'o.mJ..l'o.m[..lH..l...l'o.mC..l'o.mA..l'o.mA..l'ohlI..l'o.mI..lRichH..l........................PE..d................."......*...V.......&.........@....................................n3............... .......................................x.......... ...........................Po..T............................]...............^..p............................text....(.......*.................. ..`.imrsiv......@...........................rdata..P8...P...:..................@..@.data...(............h..............@....pdata...............j..............@..@.rsrc... ............n..............@..@.reloc...............z..............@..B................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\KbLvcSLVf\DUI70.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1523712
              Entropy (8bit):5.861475842348347
              Encrypted:false
              SSDEEP:12288:5VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ12Bh:4fP7fWsK5z9A+WGAW+V5SB6Ct4bnb2
              MD5:1B515CB5B54D379E258F3BE018F2DCC5
              SHA1:448821262C4B6775152F3D1FC3F70A125A7A4A78
              SHA-256:65E9D5DC7D6ECAB9FEB419B641726C56772C951270750ECC51317C305AB62CAC
              SHA-512:5A0A16531FFEE2A563933EE571C913D1EF2557D3C57EC177D27F8798438062C828EC7D4BFACD32E315F5D150239A3029B67C1B99D6B391461F3C1E6E88E6A7EB
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ......... ......p..........@.............................@......@lx}..b.............................................dQ...c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):98304
              Entropy (8bit):5.996546491031358
              Encrypted:false
              SSDEEP:1536:3bo99g4+4G8mMM+nCA+o6UJMUHznV80KCt1p7Gx:LXH4GvNKAUHR80KCt/G
              MD5:C91CCEF3884CFDE746B4BAEF5F1BC75C
              SHA1:9A7E17BA64FE1842E904D4019D9BB9B005E61E55
              SHA-256:E6C9C88491EF6FB4B4DAFAC3276C8E2A3B2BC3C4D7825F4EAA3AC99E1801195B
              SHA-512:431754EC35871B2ED1F5E9FC621F24B6187720C0562D0ABDC9232A063DA1E8419A07CDC1740A3B433A80BA15FF25F0EAE0E5B331985A7B8ABC9CE8E73CBC210E
              Malicious:false
              Antivirus:
              • Antivirus: Metadefender, Detection: 0%, Browse
              • Antivirus: ReversingLabs, Detection: 0%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D.....@..@..@..8@..@o..A..@o..A..@o..A..@o..A..@..@4.@o..A..@o.T@..@o..A..@Rich..@................PE..d....0..........."............................@....................................R................ .......................................L..,.......x.......................d...p...T............................................................................text............................... ..`.imrsiv..................................rdata...x.......z..................@..@.data................P..............@....pdata...............Z..............@..@.rsrc...x............d..............@..@.reloc..d............~..............@..B........................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\WkAB\DUI70.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1523712
              Entropy (8bit):5.861361447985384
              Encrypted:false
              SSDEEP:12288:cVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1m5:pfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:0E2C09A45BC0ED953B1A20E3DDD9D186
              SHA1:80317AB8392B224A9091359C0A16DA40D35053F5
              SHA-256:2E2F9B6F590F13C1834BA38AFFE06DAA48AA7A0994EEE493D5011B336B0CC6A9
              SHA-512:9F9EA4D4E62D0863212B227B2DF45BFD751D43BC5E674BADD730DDB1FD0E67AC9F99D0B4F8B209B0B4AA73467DDCEB29075E6BEFA7C9620A3CA056E00DD0C8F5
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ......... ......p..........@.............................@......@lx}..b.............................................dQ...c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\WkAB\PasswordOnWakeSettingFlyout.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):43472
              Entropy (8bit):6.224421457593777
              Encrypted:false
              SSDEEP:768:+pH9d9NT4uJO0qK/lEbrDGe2gfBTDxxsg652PIBmRncHiDgcZd3cxe1PIc:EzNT4GpHaTDvst2gmRnVdZVcgPIc
              MD5:F0C8675F98E397383A112CC8ED5B97DA
              SHA1:644A87D9CEE0BC576402573224F6695AA45196D3
              SHA-256:0E9C85E4833BB1BF45CB66AA3B021A2CDA6074333C2217F8FFB5360B63719374
              SHA-512:ABF6B2BB5BB48C1C2E54C01656D3C448E8CD4159686F285D67CFF805A757FFAF6B0D7D9DD579786B739AD90ECB1FB6D43A181CBEBBC27FEA3504D48B61C10A5C
              Malicious:false
              Antivirus:
              • Antivirus: Metadefender, Detection: 0%, Browse
              • Antivirus: ReversingLabs, Detection: 0%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h.....J...J...J.q_J...J.m.K...J.m.K...J.m.K...J.m.K...J...J...J.m.K...J.m3J...J.m.K...JRich...J................PE..d....Z..........."......B...F.......I.........@....................................*}............... ......................................@...................,........#...........|..T...........................0q..............0r...............................text....A.......B.................. ..`.imrsiv......`...........................rdata..8$...p...&...F..............@..@.data................l..............@....pdata..,............n..............@..@.rsrc................t..............@..@.reloc..............................@..B........................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\bQkmObl\RDVGHelper.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):107008
              Entropy (8bit):6.213211715541241
              Encrypted:false
              SSDEEP:1536:jZPv9YEIT8g15BZNWNBWNK5/FzUJmufD6o6ffv+Difx1P4dirH+Z3sUS+CvilU/s:lPBLBBbWDwff22J1Puq+y+HUk
              MD5:0BF1E2262C95164A0B244174167FBD85
              SHA1:81BD08AD31BF2665F298406F843924588BB7606B
              SHA-256:6B35C354C480D232A96EF73EABA268EF7D94F30A3D3A1161B69081B048A27E29
              SHA-512:FD01664A377359E72A67F52E8DFFDD237E24F8ACC158B3A478F71CAAC1CE2EDDB19B15E1FC66CB73E77DDED564D6A98FD3064BDA20419D8C949505457721BF5C
              Malicious:false
              Antivirus:
              • Antivirus: Metadefender, Detection: 0%, Browse
              • Antivirus: ReversingLabs, Detection: 0%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L..................g......g......g......g...........g......g.w....g......Rich...................PE..d......o.........."......B...b......`G.........@..........................................`.......... ..........................................................T...............$.......T............................g...............h...............................text....@.......B.................. ..`.rdata...A...`...B...F..............@..@.data...............................@....pdata..T...........................@..@.rsrc...............................@..@.reloc..$...........................@..B................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\bQkmObl\WTSAPI32.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1241088
              Entropy (8bit):5.503813896207835
              Encrypted:false
              SSDEEP:12288:hVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:QfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:F2A29CC94479DC03351404004C40E18A
              SHA1:778E570E30ABD2DCAEFEDCC2D24F35F81D56AC5E
              SHA-256:BB734D97EF436A89FC93C426141CDE1A5A73C73B7E10CBEB667105C44823CA5E
              SHA-512:7758DDA6DC6D6E1AE63A6F7D84C1EBA50470DAD48052A4AA7609BDF4AB33BF5253FB7368F0A78747F78D19F4D77E0ACD7DE9DE53B42C3863159513ABB031988A
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ................p..........@....................................@lx}..b..................................................c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):92160
              Entropy (8bit):5.664138088677901
              Encrypted:false
              SSDEEP:1536:D/BmrFjio5/vzDSPwiEKi3xGyibqZ3qOT3:9mp5SwiEKWZiTo3
              MD5:E23643C785D498FF73B5C9D7EA173C3D
              SHA1:56296F1D29FC2DCBFAA1D991C87B10968C6D3882
              SHA-256:40F423488FC0C13DED29109F8CC1C0D2CCE52ECB1BD01939EF774FE31014E0F4
              SHA-512:22E29A06F19E2DA941A707B8DA7115E0F5962617295CC36395A8E9B2A98F0239B6519B4BF4AB1DC671DEF8CD558E8F59F4E50C63130D392D1E085BBF6B710914
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%...a...a...a...h...o......b......r......i......j...a..........c.....j.`......`...Richa...................PE..d...x.1".........."......\...........b.........@.....................................H....`.......... ..............................................................................|..T...........................`r..............`s..8............................text....[.......\.................. ..`.rdata...-...p.......`..............@..@.data... ...........................@....pdata..............................@..@.rsrc...............................@..@.reloc...............f..............@..B................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\mJLa\MFC42u.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1265664
              Entropy (8bit):5.5179792497477465
              Encrypted:false
              SSDEEP:12288:0VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1hBB:xfP7fWsK5z9A+WGAW+V5SB6Ct4bnb7
              MD5:ACAA18F0CA1472EBA6752C43A76F63D4
              SHA1:1BD14A5CB0788853667F25EE5DC84DBABFB1E69A
              SHA-256:7BBCEA1DD21373D8A86FD2A6048971967CA3E410A7D5799222474DF7A97D66AB
              SHA-512:FA56F548843551898F932B285D83ED3238138F246E0FA642EC6719C5886DDF4B71A1D65A04707EA0301B767543CB8C8EA3DAA478C98D4039B5FAB35183B0E57B
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." .........0......p..........@.............................P......@lx}..b..............................................l...c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\pZCYq8TUy\credui.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1241088
              Entropy (8bit):5.497178010630534
              Encrypted:false
              SSDEEP:12288:kVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:BfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:092BC1900DB5A3970E41A4A850EC783E
              SHA1:D89437CB8A48260E34A0D0C44768F7662CAEB2F4
              SHA-256:F151BAEF206217841A78357977495815717409F349365DB9FFD4DB6166E83CDD
              SHA-512:414B9DFE04E94B275A48EFE03DA688A0AAF80B0DFF9B461A29C92E4D8E5799371A937F5B13F520B16ABD465E29F1D38713DB1C825F4BB282CC9BAF1868C6F51B
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ................p..........@....................................@lx}..b..................................................c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):3640832
              Entropy (8bit):5.884402821447862
              Encrypted:false
              SSDEEP:98304:q8yNOTNEpZxGb+ZPgN6tYDNBMe+8noqvEYw0n2WFfZT+xgsLOsMg:q8yNOTNEpZxk+ZIN6tYDNBMe+8noqvEB
              MD5:3FBB5CD8829E9533D0FF5819DB0444C0
              SHA1:A4A6E4E50421E57EA4745BA44568B107A9369447
              SHA-256:043870DBAB955C1851E1710D941495357383A08F3F30DD3E3A1945583A85E0CA
              SHA-512:349459CCF4DDFB0B05B066869C99088BA3012930D5BBC3ED1C9E4CF6400687B1EFE698C5B1734BF6FF299F6C65DD7A71A2709D3773E9E96F6FDE659F5D883F48
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... w.dN$.dN$.dN$..M%.dN$..J%.dN$..K%.dN$..O%.dN$.dO$TfN$..G%.eN$...$.dN$..L%.dN$Rich.dN$........PE..d.....Y..........."......$....%.....p..........@..............................7......K8...`..................................................].......p..H>!.....`.............7. *..P...T...........................`...............`........\..`....................text....".......$.................. ..`.rdata...\...@...^...(..............@..@.data...P(..........................@....pdata..`...........................@..@.didat..(....`....... ..............@....rsrc...H>!..p...@!.."..............@..@.reloc.. *....7..,...b7.............@..B........................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):304640
              Entropy (8bit):6.843015704242449
              Encrypted:false
              SSDEEP:6144:E/Odkrq1AlGra6uFz2LJGRg4kLNnei36cw:As5+FCdUc
              MD5:F87F2E5EBF3FFBA39DF1621B5F8689B5
              SHA1:B4E358BF1BE0DF6D341CA1BC949867D94F13EC07
              SHA-256:06780477637707BEA6317AE81D059A4D75B101542ADFA6DC855287EAEDFC822A
              SHA-512:6E8D60C17396260791898A2914422AFFF2921A4C3D924F56C83ED117B683D3F3AEFB15E234600F3B5375A47C0C6A13F6160B0638CA91663D29DC56067EB5E5B7
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)..8m..km..km..kd.Hki..k...jn..k...j{..k...j`..k...jv..km..k3..k...jx..k..$kl..k...jl..kRichm..k........PE..d...1.(i.........."............................@....................................L}....`.......... ......................................(0..,........5......................X.......T............................................................................text............................... ..`.rdata..............................@..@.data...0....p.......X..............@....pdata...............b..............@..@.rsrc....5.......6...l..............@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\rm4w0\OLEACC.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1241088
              Entropy (8bit):5.496643926580779
              Encrypted:false
              SSDEEP:12288:QVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:VfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:D3FE50240DC0CB29FD1626AD60D27A33
              SHA1:4CDC09987F4ED88D1A133E384A150AA6B079A9A0
              SHA-256:7AEAAA41996A44EA2A028D695DF30580802B65D8D4B9A3FB26CAE91EFA00E3CF
              SHA-512:70903C4596F5AE1CE905E3CACCCAB75F82A5148766CD002ED4414C63179CDECB34898DF791FF439BB56F20571453057CCB443F93B19A9101D6E3C7FCF7C7905F
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ................p..........@....................................@lx}..b..................................................c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\sBx0fm\VERSION.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1241088
              Entropy (8bit):5.4946364596901
              Encrypted:false
              SSDEEP:12288:RVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:gfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:5361D083DFF1152C4481BAA13FFA6689
              SHA1:68DACC124F275798E5511A815304311F4CC17014
              SHA-256:67DB65C41FEFBE51F18ED9F1A8C6BC09BDEEE7D5507F82446CFA5B7EB8E83F8F
              SHA-512:D500FB3985B472D0AC44A1E78D855FD52CBD5607063D5D451F3DEBA1B6D26FA486B90289E71847D0E3E6F1ECBFD374740656FF3DFB94765FCD092EE0CB64FC85
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ................p..........@....................................@lx}..b.............................................+....c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\sBx0fm\psr.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):600576
              Entropy (8bit):6.4861677167766665
              Encrypted:false
              SSDEEP:12288:B2mS50ICmAX+ASa8wd9Nkmw6cD8pellpco//EH1:B2mlmeFSa8wd9NStApeCoXEH
              MD5:3B8262EB45E790BF7FA648CEE2CCCB7B
              SHA1:EDDD81D1B3FD2EE99E42A43B25BD74D39BB850BC
              SHA-256:D1225E9FD2834BD2EF84EADAA4126020D20F4A0F50321440190C3896E69BD5D8
              SHA-512:A3709D39372CDB6D9C9E58932144CE8BA437C2134EFC9BCD2531708C1515CBAEA5929C220DF25D76785F7594BC5F8541E6ED5330EA3CA12E87C4DA5A2171C435
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}.............x......x......x..........x...x......x......xR.....x......Rich....................PE..d....S............".................`..........@....................................h.....`.......... .......................................7..,...............L...............D.......T........................... ...............X...8....7..@....................text...5........................... ..`.rdata..............................@..@.data....m...`.......H..............@....pdata..L............T..............@..@.didat...............j..............@....rsrc................l..............@..@.reloc..D............&..............@..B................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\xlPP\wer.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1245184
              Entropy (8bit):5.502578344059862
              Encrypted:false
              SSDEEP:12288:8VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:JfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:9E94BC8A0688A10E6CEA3FD9A924C09E
              SHA1:11342B809DF3914361510FE0FE1734804CA268DB
              SHA-256:7984FB0BE2E6A704A2C2299A0519AA14A3CB475B95DEC8C836D054FB8783984A
              SHA-512:0A8BED06C8D8C732AF3639D5261BDDF96895521BA7C2A523B4F7377FA53CE94DF06F2AAD9B47E1B0619A320462BD487DFC32194869E72E0F81FBE822690129DA
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ................p..........@....................................@lx}..b.............................................W....c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Local\xlPP\wermgr.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):209312
              Entropy (8bit):6.796289498157116
              Encrypted:false
              SSDEEP:6144:swTMBboFMSuc/9NPXWPJROo/wVJyB60OHyLC7vs:swTMB02SD/mXO64c2Hyw
              MD5:FF214585BF10206E21EA8EBA202FACFD
              SHA1:1ED4AE92D235497F62610078D51105C4634AFADE
              SHA-256:C48C430EB07ACC2FF8BDDD6057F5C9F72C2E83F67478F1E4A1792AF866711538
              SHA-512:24073F60B886C58F227769B2DD7D1439DF841784E43E753265DA761801FDA58FBEEDAC4A642E0A6ABDA40A6263153FAA1A9540DF6D35E38BF0EE5327EA55B4FE
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(j.jI..jI..jI..c1...I...-..iI...-..qI..jI...H...-..mI...-..`I...-..KI...-..kI...-..kI..RichjI..................PE..d...p............"......,..........`(.........@.............................p.......................`......................................... .... ..0:...............!...`..\...@...T...........................`Q..............`R.. ...t........................text...++.......,.................. ..`.imrsiv......@...........................rdata.......P.......0..............@..@.data...X...........................@....pdata..............................@..@.didat..@...........................@....rsrc...0:... ...<..................@..@.reloc..\....`......................@..B................................................................................................................................................................................
              C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):43008
              Entropy (8bit):5.898730459072675
              Encrypted:false
              SSDEEP:768:2nweYBCOBU+khtTMstnGUEqbfynaDWVVVFZ5i7t4AYRyF:TiaU+1qDya6VV7Z5SudyF
              MD5:0795B6F790F8E52D55F39E593E9C5BBA
              SHA1:6A9991A1762AAC176E3F47AB210CC121E038E4F9
              SHA-256:DF5B698983C3F08265F2FB0B74046CD7E68568190F329C8331CCA4761256D33B
              SHA-512:72D332EBDD1B9B40E18F565DACC200E5B710A91D803D536A0CF127C74622EED12A5EC855B9040F4A1FA8A44584E4E97E7E6C490B88DB3BDAFE61EA3FBF26AB59
              Malicious:false
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.G.i.).i.).i.).`..o.)...*.k.)...-.}.)...,.j.)...(.|.).i.(..)... .}.).....h.)...+.h.).Richi.).........................PE..d................"......j...@.......q.........@....................................|.....`.......... ..........................................................<...................@...T...........................@...............@................................text....h.......j.................. ..`.rdata..n'.......(...n..............@..@.data...............................@....pdata..<...........................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\zLYZkwYH\WINSTA.dll
              Process:C:\Windows\explorer.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):1245184
              Entropy (8bit):5.512898849354316
              Encrypted:false
              SSDEEP:12288:4VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:tfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              MD5:4CD034EF892E4ACE84DE2EDF40C5C4F8
              SHA1:6DC79223A1CBE044E2E4071A301980B19FA3C9BC
              SHA-256:3C508E30EA6B7182E35ADCBC610F7B434B658859871082F4E63F56E7F1A44E2F
              SHA-512:5D7955CBFC760BA57987ABD973CFCED4C8EFE48BD753A25357285041AEF3D4CA2159407BFAB63CE291BFBC791A098CE903E440DE39AC44822C2A5FD41D3AD70A
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.(..DN^.........." ................p..........@....................................@lx}..b.............................................m....c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
              C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\eb42b1a5c308fc11edf1ddbdd25c8486_d06ed635-68f6-4e9a-955c-4899f5f57b9a
              Process:C:\Windows\explorer.exe
              File Type:data
              Category:dropped
              Size (bytes):4462
              Entropy (8bit):5.486322521408924
              Encrypted:false
              SSDEEP:48:eBYynUf3KN7ms4dD24d7eDM36jhJQM4BYynU2QMR6CTj5iJWo49pYCUzMmKpH1:eusI3KN2D24ZeDkiwus3/R6WwIo6vo8V
              MD5:E6110DEC2D5794F12E28864B52AA17DF
              SHA1:35BB21C92A1977140B7EC8A0F80AC6FD1947B230
              SHA-256:48CEBC917B864CB68722E1960DDB91D86D4BBAB294CC735FD1FB834B5759E03E
              SHA-512:4E24FF2F1DAEF75435B1BF9F9D3EC1E3B2BFD1FAA4C2C2811FF518E5FA531235F07E47281A33A6D75FB363AF4A0221E512FE9CD565402FEFF1DFC1ED529D1625
              Malicious:false
              Preview: ........................................user.........................................user.....................RSA1...................mL..\...m.k.N..2........,y$}=...S.............Z.D\...CM.]..."[.....b.0Rt.>.`.u..N.n..dK...K&...{..>.{B...^........h?.R}......................z..O........!p..N...<..8.....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .....?.o..t8......U..dh..8.l..`l............... ...$.B...u?...I.c...x.N.s..t....I.....7.L......A...*.>r.........;.a..... #b9|T*f(..'...|.^?..r..o..:~eM.....x.....Y..:.P.;w\..h...[........{...~<lB.Yb...-.......D...D.n..t..~...u..0....p...~.}.r..b5..v.zW..3.A..5_#;..]Sg...D8.......V"{:i.,..P..Z....$..X.*.x...V.d.)...M.~I.',..s.%...........r.)........:...J.....P..0fa.......ySA}...HF(.i.C.@^@U.s0.E... .....D...G...j..l.:.hT....;.f,....(....].\...IBU..oq...XM.3.].h.....eg.:.o1.T...R...$%.?s.K.n/........K..8............7...`...{.a...RC[.......3..u.m...b..@..J..yq2.K..f....^....q..NNV#.9..G#.M

              Static File Info

              General

              File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Entropy (8bit):5.507980268942348
              TrID:
              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
              • Win64 Executable (generic) (12005/4) 10.17%
              • Generic Win/DOS Executable (2004/3) 1.70%
              • DOS Executable Generic (2002/1) 1.70%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
              File name:DC2zX44MQr.dll
              File size:1236992
              MD5:94f8317b419e9476120b14a29d9b05d2
              SHA1:f2b03dd4441f3808468bdbb8b26273cfb41b5298
              SHA256:2f10b593a5e04506d8050ebe39e28619199958a4f4bae0b9f3a1ee2af3d74862
              SHA512:73edd03df050bf72249dafdc8e0c71884d236e713b871c5e8ce9c825937ba1c8447ae791e39400a1d7b5af77aa5ec5d01b6db356003e9616ed7d24e7f78b24a3
              SSDEEP:12288:+VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:jfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|.

              File Icon

              Icon Hash:74f0e4ecccdce0e4

              Static PE Info

              General

              Entrypoint:0x140041070
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Time Stamp:0x5E4E44CC [Thu Feb 20 08:35:24 2020 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:6668be91e2c948b183827f040944057f

              Entrypoint Preview

              Instruction
              dec eax
              xor eax, eax
              dec eax
              add eax, 5Ah
              dec eax
              mov dword ptr [00073D82h], ecx
              dec eax
              lea ecx, dword ptr [FFFFECABh]
              dec eax
              mov dword ptr [00073D7Ch], edx
              dec eax
              add eax, ecx
              dec esp
              mov dword ptr [00073D92h], ecx
              dec esp
              mov dword ptr [00073DA3h], ebp
              dec esp
              mov dword ptr [00073D7Ch], eax
              dec esp
              mov dword ptr [00073D85h], edi
              dec esp
              mov dword ptr [00073D86h], esi
              dec esp
              mov dword ptr [00073D8Fh], esp
              dec eax
              mov ecx, eax
              dec eax
              sub ecx, 5Ah
              dec eax
              mov dword ptr [00073D89h], esi
              dec eax
              test eax, eax
              je 00007F3530BCA48Fh
              dec eax
              mov dword ptr [00073D45h], esp
              dec eax
              mov dword ptr [00073D36h], ebp
              dec eax
              mov dword ptr [00073D7Fh], ebx
              dec eax
              mov dword ptr [00073D70h], edi
              dec eax
              test eax, eax
              je 00007F3530BCA46Eh
              jmp ecx
              dec eax
              add edi, ecx
              dec eax
              mov dword ptr [FFFFEC37h], ecx
              dec eax
              xor ecx, eax
              jmp ecx
              retn 0008h
              ud2
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push ebx
              dec eax
              sub esp, 00000080h
              mov eax, F957B016h
              mov byte ptr [esp+7Fh], 00000037h
              mov edx, dword ptr [esp+78h]
              inc ecx
              mov eax, edx
              inc ecx
              or eax, 5D262B0Ch
              inc esp
              mov dword ptr [esp+78h], eax
              dec eax
              mov dword ptr [eax+eax+00h], 00000000h

              Rich Headers

              Programming Language:
              • [LNK] VS2012 UPD4 build 61030
              • [ASM] VS2013 UPD2 build 30501
              • [ C ] VS2012 UPD2 build 60315
              • [C++] VS2013 UPD4 build 31101
              • [RES] VS2012 UPD3 build 60610
              • [LNK] VS2017 v15.5.4 build 25834
              • [ C ] VS2017 v15.5.4 build 25834
              • [ASM] VS2010 build 30319
              • [EXP] VS2015 UPD1 build 23506
              • [IMP] VS2008 SP1 build 30729
              • [RES] VS2012 UPD4 build 61030
              • [LNK] VS2012 UPD2 build 60315
              • [C++] VS2015 UPD1 build 23506
              • [ C ] VS2013 UPD4 build 31101

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x12d0100x19f.xmo
              IMAGE_DIRECTORY_ENTRY_IMPORT0xa63900xa0.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x468.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc10000x2324.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x420000xc0.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x407960x41000False0.776085486779data7.73364605679IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x420000x64fcb0x65000False0.702262047494data7.86510283498IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xa70000x178b80x18000False0.0694580078125data3.31515306295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .pdata0xbf0000x12c0x1000False0.06005859375PEX Binary Archive0.581723022719IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0xc00000x8800x1000False0.139892578125data1.23838501563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xc10000x23240x3000False0.0498046875data4.65321444248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .qkm0xc40000x74a0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .cvjb0xc50000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tlmkv0xc70000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .wucsxe0xc80000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .wnx0x10e0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .weqy0x10f0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .yby0x1100000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ormx0x1120000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .dhclu0x1130000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xmiul0x1140000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tlwcxe0x1150000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .get0x1160000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .hzrd0x1170000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .qzu0x1190000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .nhglos0x11a0000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .itzo0x11b0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .nmsaom0x11c0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rvhi0x11d0000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ucrzce0x11e0000x3890x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ijc0x11f0000xbf60x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ohvs0x1200000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rlvrc0x1210000x1ee0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .yjv0x1220000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .clbcyy0x1230000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xcyn0x1240000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .boqx0x1250000x3890x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rnlia0x1260000x3890x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ctip0x1270000x5a70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .fkv0x1280000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .pczrv0x12a0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ibglr0x12b0000x3fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .uirkq0x12c0000x3ba0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xmo0x12d0000x1af0x1000False0.070068359375data0.884469413236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_VERSION0xc00a00x370dataEnglishUnited States
              RT_MANIFEST0xc04100x56ASCII text, with CRLF line terminatorsEnglishUnited States

              Imports

              DLLImport
              USER32.dllLookupIconIdFromDirectoryEx, WaitForInputIdle, GetParent, GetFocus
              SETUPAPI.dllCM_Get_Resource_Conflict_DetailsW
              KERNEL32.dllDeleteCriticalSection, DeleteTimerQueue, TerminateJobObject, GetFileInformationByHandle, GetThreadLocale, GetNamedPipeServerProcessId, GetConsoleFontSize
              GDI32.dllCreateBitmapIndirect, GetPolyFillMode
              CRYPT32.dllCertGetCTLContextProperty
              ADVAPI32.dllAddAccessDeniedObjectAce
              SHLWAPI.dllChrCmpIW

              Exports

              NameOrdinalAddress
              DisplaySYSDMCPL10x1400186ec
              EditEnvironmentVariables20x140014580
              EditUserProfiles30x140001768
              EnableExecuteProtectionSupportW40x140037da0
              ModifyExecuteProtectionSupportW50x140030704
              NoExecuteAddFileOptOutList60x14002a1c0
              NoExecuteAddFileOptOutListW70x140035ddc
              NoExecuteProcessExceptionW80x1400164c4
              NoExecuteRemoveFileOptOutList90x140015998
              NoExecuteRemoveFileOptOutListW100x14001a104

              Version Infos

              DescriptionData
              LegalCopyright Microsoft Corporation. All rights reserv
              InternalNamebitsp
              FileVersion7.5.7600.16385 (win7_rtm.090713-
              CompanyNameMicrosoft Corporati
              ProductNameMicrosoft Windows Operating S
              ProductVersion6.1.7600
              FileDescriptionBackground Intellig
              OriginalFilenamekbdy
              Translation0x0409 0x04b0

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Network Port Distribution

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Sep 28, 2021 19:14:14.984349012 CEST6033853192.168.2.78.8.8.8
              Sep 28, 2021 19:14:15.018414021 CEST53603388.8.8.8192.168.2.7
              Sep 28, 2021 19:14:31.646061897 CEST5871753192.168.2.78.8.8.8
              Sep 28, 2021 19:14:31.671478033 CEST53587178.8.8.8192.168.2.7
              Sep 28, 2021 19:14:52.503011942 CEST5976253192.168.2.78.8.8.8
              Sep 28, 2021 19:14:52.521750927 CEST53597628.8.8.8192.168.2.7
              Sep 28, 2021 19:14:55.160108089 CEST5432953192.168.2.78.8.8.8
              Sep 28, 2021 19:14:55.179826021 CEST53543298.8.8.8192.168.2.7
              Sep 28, 2021 19:14:55.268310070 CEST5805253192.168.2.78.8.8.8
              Sep 28, 2021 19:14:55.312179089 CEST53580528.8.8.8192.168.2.7
              Sep 28, 2021 19:14:56.556112051 CEST5400853192.168.2.78.8.8.8
              Sep 28, 2021 19:14:56.575474977 CEST53540088.8.8.8192.168.2.7
              Sep 28, 2021 19:14:57.998117924 CEST5945153192.168.2.78.8.8.8
              Sep 28, 2021 19:14:58.017493010 CEST53594518.8.8.8192.168.2.7
              Sep 28, 2021 19:14:58.487844944 CEST5291453192.168.2.78.8.8.8
              Sep 28, 2021 19:14:58.505630016 CEST53529148.8.8.8192.168.2.7
              Sep 28, 2021 19:14:58.975784063 CEST6456953192.168.2.78.8.8.8
              Sep 28, 2021 19:14:58.995593071 CEST53645698.8.8.8192.168.2.7
              Sep 28, 2021 19:14:59.912367105 CEST5281653192.168.2.78.8.8.8
              Sep 28, 2021 19:14:59.934814930 CEST53528168.8.8.8192.168.2.7
              Sep 28, 2021 19:15:00.325953007 CEST5078153192.168.2.78.8.8.8
              Sep 28, 2021 19:15:00.361572981 CEST53507818.8.8.8192.168.2.7
              Sep 28, 2021 19:15:00.684242010 CEST5423053192.168.2.78.8.8.8
              Sep 28, 2021 19:15:00.701716900 CEST53542308.8.8.8192.168.2.7
              Sep 28, 2021 19:15:01.393390894 CEST5491153192.168.2.78.8.8.8
              Sep 28, 2021 19:15:01.412703991 CEST53549118.8.8.8192.168.2.7
              Sep 28, 2021 19:15:02.618539095 CEST4995853192.168.2.78.8.8.8
              Sep 28, 2021 19:15:02.637355089 CEST53499588.8.8.8192.168.2.7
              Sep 28, 2021 19:15:03.714611053 CEST5086053192.168.2.78.8.8.8
              Sep 28, 2021 19:15:03.774904013 CEST53508608.8.8.8192.168.2.7
              Sep 28, 2021 19:15:04.471513987 CEST5045253192.168.2.78.8.8.8
              Sep 28, 2021 19:15:04.506480932 CEST53504528.8.8.8192.168.2.7
              Sep 28, 2021 19:15:05.449511051 CEST5973053192.168.2.78.8.8.8
              Sep 28, 2021 19:15:05.470241070 CEST53597308.8.8.8192.168.2.7
              Sep 28, 2021 19:15:10.173793077 CEST5931053192.168.2.78.8.8.8
              Sep 28, 2021 19:15:10.193933010 CEST53593108.8.8.8192.168.2.7
              Sep 28, 2021 19:15:30.005969048 CEST5191953192.168.2.78.8.8.8
              Sep 28, 2021 19:15:30.023964882 CEST53519198.8.8.8192.168.2.7
              Sep 28, 2021 19:15:37.120172977 CEST6429653192.168.2.78.8.8.8
              Sep 28, 2021 19:15:37.139909983 CEST5668053192.168.2.78.8.8.8
              Sep 28, 2021 19:15:37.150744915 CEST53642968.8.8.8192.168.2.7
              Sep 28, 2021 19:15:37.166969061 CEST53566808.8.8.8192.168.2.7
              Sep 28, 2021 19:15:56.290057898 CEST5882053192.168.2.78.8.8.8
              Sep 28, 2021 19:15:56.325064898 CEST53588208.8.8.8192.168.2.7
              Sep 28, 2021 19:15:58.319705963 CEST6098353192.168.2.78.8.8.8
              Sep 28, 2021 19:15:58.339636087 CEST53609838.8.8.8192.168.2.7
              Sep 28, 2021 19:16:33.391506910 CEST4924753192.168.2.78.8.8.8
              Sep 28, 2021 19:16:33.411485910 CEST53492478.8.8.8192.168.2.7
              Sep 28, 2021 19:17:30.636225939 CEST5228653192.168.2.78.8.8.8
              Sep 28, 2021 19:17:30.670250893 CEST53522868.8.8.8192.168.2.7

              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:19:14:06
              Start date:28/09/2021
              Path:C:\Windows\System32\loaddll64.exe
              Wow64 process (32bit):false
              Commandline:loaddll64.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll'
              Imagebase:0x7ff7eaf80000
              File size:1136128 bytes
              MD5 hash:E0CC9D126C39A9D2FA1CAD5027EBBD18
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:moderate

              General

              Start time:19:14:06
              Start date:28/09/2021
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1
              Imagebase:0x7ff7bf140000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:19:14:07
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,DisplaySYSDMCPL
              Imagebase:0x7ff775bc0000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000002.00000002.330302590.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:19:14:07
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe 'C:\Users\user\Desktop\DC2zX44MQr.dll',#1
              Imagebase:0x7ff775bc0000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.252587929.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:19:14:08
              Start date:28/09/2021
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff662bf0000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:19:14:10
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditEnvironmentVariables
              Imagebase:0x7ff775bc0000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000006.00000002.258809816.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:19:14:14
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\DC2zX44MQr.dll,EditUserProfiles
              Imagebase:0x7ff775bc0000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.266253941.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:19:14:46
              Start date:28/09/2021
              Path:C:\Windows\System32\DmNotificationBroker.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\DmNotificationBroker.exe
              Imagebase:0x7ff67baa0000
              File size:32256 bytes
              MD5 hash:1643D5735213BC89C0012F0E48253765
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              General

              Start time:19:14:51
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\EwdQnyo\DmNotificationBroker.exe
              Imagebase:0x7ff686900000
              File size:32256 bytes
              MD5 hash:1643D5735213BC89C0012F0E48253765
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000013.00000002.366691390.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 0%, Virustotal, Browse
              • Detection: 0%, Metadefender, Browse
              • Detection: 0%, ReversingLabs
              Reputation:moderate

              General

              Start time:19:15:03
              Start date:28/09/2021
              Path:C:\Windows\System32\RdpSa.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\RdpSa.exe
              Imagebase:0x7ff794d50000
              File size:43008 bytes
              MD5 hash:0795B6F790F8E52D55F39E593E9C5BBA
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:19:15:03
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\zLYZkwYH\RdpSa.exe
              Imagebase:0x7ff644d50000
              File size:43008 bytes
              MD5 hash:0795B6F790F8E52D55F39E593E9C5BBA
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000019.00000002.393120079.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:19:15:16
              Start date:28/09/2021
              Path:C:\Windows\System32\Utilman.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\Utilman.exe
              Imagebase:0x7ff728540000
              File size:98304 bytes
              MD5 hash:C91CCEF3884CFDE746B4BAEF5F1BC75C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:19:15:20
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\KbLvcSLVf\Utilman.exe
              Imagebase:0x7ff719840000
              File size:98304 bytes
              MD5 hash:C91CCEF3884CFDE746B4BAEF5F1BC75C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001C.00000002.429090698.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 0%, Metadefender, Browse
              • Detection: 0%, ReversingLabs

              General

              Start time:19:15:34
              Start date:28/09/2021
              Path:C:\Windows\System32\EaseOfAccessDialog.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\EaseOfAccessDialog.exe
              Imagebase:0x7ff6cc0e0000
              File size:304640 bytes
              MD5 hash:F87F2E5EBF3FFBA39DF1621B5F8689B5
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:19:15:34
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\rm4w0\EaseOfAccessDialog.exe
              Imagebase:0x7ff792c30000
              File size:304640 bytes
              MD5 hash:F87F2E5EBF3FFBA39DF1621B5F8689B5
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000021.00000002.459149344.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:19:15:46
              Start date:28/09/2021
              Path:C:\Windows\System32\DevicePairingWizard.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\DevicePairingWizard.exe
              Imagebase:0x7ff74a2d0000
              File size:92160 bytes
              MD5 hash:E23643C785D498FF73B5C9D7EA173C3D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:19:15:52
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\mJLa\DevicePairingWizard.exe
              Imagebase:0x7ff6cb020000
              File size:92160 bytes
              MD5 hash:E23643C785D498FF73B5C9D7EA173C3D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000023.00000002.498301124.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:19:16:04
              Start date:28/09/2021
              Path:C:\Windows\System32\wermgr.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\wermgr.exe
              Imagebase:0x7ff62a2c0000
              File size:209312 bytes
              MD5 hash:FF214585BF10206E21EA8EBA202FACFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:19:16:05
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\xlPP\wermgr.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\xlPP\wermgr.exe
              Imagebase:0x7ff776fa0000
              File size:209312 bytes
              MD5 hash:FF214585BF10206E21EA8EBA202FACFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000026.00000002.525725102.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:19:16:17
              Start date:28/09/2021
              Path:C:\Windows\System32\mstsc.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\mstsc.exe
              Imagebase:0x7ff7f3970000
              File size:3640832 bytes
              MD5 hash:3FBB5CD8829E9533D0FF5819DB0444C0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:19:16:18
              Start date:28/09/2021
              Path:C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\pZCYq8TUy\mstsc.exe
              Imagebase:0x7ff7a40d0000
              File size:3640832 bytes
              MD5 hash:3FBB5CD8829E9533D0FF5819DB0444C0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000028.00000002.555665664.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              Disassembly

              Code Analysis

              Reset < >

                Executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: }*$}*
                • API String ID: 0-2047341001
                • Opcode ID: f218d88ecbe768a3c2e15b48e098ea3b44daa8c6dba81671f269a0c6fd7b68aa
                • Instruction ID: dfe71950bb4b00d773a2c1e4d7d9ca62016f185058a51a46645e99606ce0912a
                • Opcode Fuzzy Hash: f218d88ecbe768a3c2e15b48e098ea3b44daa8c6dba81671f269a0c6fd7b68aa
                • Instruction Fuzzy Hash: CDF2E476601B8481EB269F17D5503EE77A1F78EBC8F9A4025EB0A077B5DB38C945C348
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: ConsoleEntryFreePoint
                • String ID: )8GV$d
                • API String ID: 3550414006-3589632123
                • Opcode ID: d05d8187567b24d43b5378db4c26f8457bb6311b4b9be5c519ef70a53fb6d972
                • Instruction ID: d510f836e5bc92855b025e221ee4853bd72dbb3d22a76ed0b2795177c136f2ac
                • Opcode Fuzzy Hash: d05d8187567b24d43b5378db4c26f8457bb6311b4b9be5c519ef70a53fb6d972
                • Instruction Fuzzy Hash: 2C91983230064096EB26EB66D0513EE23A5AB9C7D4F914526BB1E47BFBEE34CA05C350
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: InfoSystem
                • String ID: sy;$sy;
                • API String ID: 31276548-3660992706
                • Opcode ID: 4ba7a1a776c1b2a8194e3aee1005776fcb25fed3b21deabde970c8a1fedf5655
                • Instruction ID: 6e6b9d6b41ba510f9365bd6ae70f9dc3139515c8db1fe8c3f4a6c85962f57752
                • Opcode Fuzzy Hash: 4ba7a1a776c1b2a8194e3aee1005776fcb25fed3b21deabde970c8a1fedf5655
                • Instruction Fuzzy Hash: 2A82DB72215B848AEB26CF27D4507E977E1F789BC4F498426EB4A077B6DB39C941C380
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: }*$}*
                • API String ID: 0-2047341001
                • Opcode ID: 7295418c03dacbe62c915b6dd4b980e4d41f822c5e8600d002afc3f8743a909a
                • Instruction ID: 589d9863290c94d963c78ae1aba4b537ce1e649f887b860e334c2c2edf70769e
                • Opcode Fuzzy Hash: 7295418c03dacbe62c915b6dd4b980e4d41f822c5e8600d002afc3f8743a909a
                • Instruction Fuzzy Hash: B872E172211B8081EBA68F23D4547ED77A1F78DBC4F8A5125EB4A477B6EB38C944C348
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: FileFindFirst
                • String ID: .
                • API String ID: 1974802433-248832578
                • Opcode ID: 676bd74008c321f1f054d2561c231ee4757c1d63a5241c01311e4a1111e2dca9
                • Instruction ID: 4bac0f1caae8588fed560e2f4dd75fe3b4005a9d196e6938d52e54566134f4c2
                • Opcode Fuzzy Hash: 676bd74008c321f1f054d2561c231ee4757c1d63a5241c01311e4a1111e2dca9
                • Instruction Fuzzy Hash: C841A43260564085FB76DB26E1003AD73A1A748BF8F184713EF69177E9DB7AC982C742
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: )8GV$)8GV
                • API String ID: 0-993736920
                • Opcode ID: 5886ea82fe4a1d5b647365e044932bffc6999eebc1d65fac80672f325e465605
                • Instruction ID: e7db99c2ed76c24e9271fdfca30502f9120cd4f12b6678b2f47d4e41cadbe873
                • Opcode Fuzzy Hash: 5886ea82fe4a1d5b647365e044932bffc6999eebc1d65fac80672f325e465605
                • Instruction Fuzzy Hash: 3BF18F7272064095EB52EB72D8913EE6365FB993C8F900426BB0E47AFADF34CA45C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: c571d8b9788f13bc1a6c9d6d9ec75b3e860dc3d379630f9026fe8c942d3d5bbc
                • Instruction ID: ba306794fc56961ae9be9e8108b60f4a03202e28571258f9feaa1cffdeadac3d
                • Opcode Fuzzy Hash: c571d8b9788f13bc1a6c9d6d9ec75b3e860dc3d379630f9026fe8c942d3d5bbc
                • Instruction Fuzzy Hash: 25B16E36601B409AE712EF26D9403EE33A6F7497C8F645825EB4E47BA6DF38D524CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: FileFindLoadNext
                • String ID:
                • API String ID: 50669962-0
                • Opcode ID: aa0438968589772fc8f2a9ec3ebe64abc64651e75ec2b3921e4afd98a3b5e278
                • Instruction ID: 5bbbb247b64301f03cc62f5655f26b2922a91791dd430743fbd3ba68f8766a4f
                • Opcode Fuzzy Hash: aa0438968589772fc8f2a9ec3ebe64abc64651e75ec2b3921e4afd98a3b5e278
                • Instruction Fuzzy Hash: 07819D3261568092FB22EB26E4513EE6365FBD83D4F814521FB4A57AEBEF38C605C704
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CloseExitProcess
                • String ID:
                • API String ID: 3487036407-0
                • Opcode ID: 6e17fe50e6f561acc205664f4a43b7bf662508175e8116978b7861a4b69f8d5b
                • Instruction ID: 3d479053040576d7404e3dfab4813d6254088c9544e20b556efee73ce8d776a8
                • Opcode Fuzzy Hash: 6e17fe50e6f561acc205664f4a43b7bf662508175e8116978b7861a4b69f8d5b
                • Instruction Fuzzy Hash: 5771BF32710A5096FB16EB72D4513EE2365AB883D9F844522BF5E53AFADF35C906C340
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: daec19cacdd098f1244212ea8e14a5d3e1bd9439d57025bc9e494c2d8b520846
                • Instruction ID: acc9ee73913d888b71121e4cedfe861758cf19cabea33dd7822bbf7d3cf7603a
                • Opcode Fuzzy Hash: daec19cacdd098f1244212ea8e14a5d3e1bd9439d57025bc9e494c2d8b520846
                • Instruction Fuzzy Hash: 42E08CA1741A0041EF265276D0803A812809B4D7B4E194B209A7D0B3E0EA3888898716
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b1fe821b06c1a4823bb9271ec043e796f757224c870123343ecb03a76390b80a
                • Instruction ID: bccbce3911ab829ef3288d496869760cb1404da12fac801df191153d1e38d36e
                • Opcode Fuzzy Hash: b1fe821b06c1a4823bb9271ec043e796f757224c870123343ecb03a76390b80a
                • Instruction Fuzzy Hash: 9172CD72601B9485FB26CF17D4503E967A1FB8EFC4F998426EB0A077A5EB39C945C380
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ef59d8dad7016460516c65c54e0757d465c5ab080b3c9532efa0d5a42b826e15
                • Instruction ID: 84a8ec628d281786b49b5e6f6f6dec0d0376b1c45e732984354cafa0c8984479
                • Opcode Fuzzy Hash: ef59d8dad7016460516c65c54e0757d465c5ab080b3c9532efa0d5a42b826e15
                • Instruction Fuzzy Hash: D761947121164102FE76B72399047EE5292AFAD3E4F650B21BF6E47BF9EE38C9018740
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ff70e36bafc14066583f36dccf9ed98aecf1f3ce13f55bc2722bc0c9a53d6bef
                • Instruction ID: 713527809b35fed6260ebd230ad48717dd4fa7a304d79e310e96a8de0daf9cee
                • Opcode Fuzzy Hash: ff70e36bafc14066583f36dccf9ed98aecf1f3ce13f55bc2722bc0c9a53d6bef
                • Instruction Fuzzy Hash: 5A717D32B04B4095FB12EBB2E4913DF67A5FBC8388F954025BB4957AAADF38D445CB04
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000002), ref: 0000000140061459
                • RegEnumKeyW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000002), ref: 00000001400614B4
                • RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000002), ref: 0000000140061539
                • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000002,?), ref: 0000000140061664
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: Close$EnumOpen
                • String ID:
                • API String ID: 138425441-0
                • Opcode ID: 672031fc434e6626b90ea1da62f3c38a687c8b9296ffac50e7f6928d6a85a361
                • Instruction ID: 4377045c35190c944746a6ea10b9b47c13ce871b5e3b3a15cce40fdff127085f
                • Opcode Fuzzy Hash: 672031fc434e6626b90ea1da62f3c38a687c8b9296ffac50e7f6928d6a85a361
                • Instruction Fuzzy Hash: 5BC1A43120568082FE629B16E8503EEA791E7C97E0F6C4A21FB6E47BE5DE78C941C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.273160012.00000248D5F10000.00000040.00000001.sdmp, Offset: 00000248D5F10000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: af70586a5050be558316b451551edb837f73f364d941a255c9ca24c001ba3865
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: A4B15576A19BC486D770CB5AF440B9EB7A1F7C9B80F108026EE8957B98DF79C8518F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 000000014005FA4B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: DescriptorSecurity$ConvertString
                • String ID: 4aX
                • API String ID: 3907675253-4042356595
                • Opcode ID: a1249fc2010d9d5d05952f0359ba200457e66aefbced3d07103a2c3463c61beb
                • Instruction ID: 5c7b4eddd96f597e19123db416744eb931adcf52cf9da5c093af566d74744993
                • Opcode Fuzzy Hash: a1249fc2010d9d5d05952f0359ba200457e66aefbced3d07103a2c3463c61beb
                • Instruction Fuzzy Hash: EC216D72214B4582EA12EF66E1403DEB3A0FB8C7C4F844525EB8D07B6AEF39D625C745
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 44297aa2126b14dcd4d9c9accf23e52108ed4399094c5e3af94dd8103b7f7b57
                • Instruction ID: c5574eec75406f68cf122a08b4571db932f63f1e1c7d3e43579234279b4bb767
                • Opcode Fuzzy Hash: 44297aa2126b14dcd4d9c9accf23e52108ed4399094c5e3af94dd8103b7f7b57
                • Instruction Fuzzy Hash: A151D03130464182FA72EA63A4507EA77A2BB8CBD4F154527BF5A077E2EF7AC801C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$PointerRead
                • String ID:
                • API String ID: 3154509469-0
                • Opcode ID: 00f6d0f3771a8cfa98223a140d65de6735ec101d3a44d5ddd75e2d9def7749f0
                • Instruction ID: 869152f87e2051f324d9e8f0f01270def7d2743b76a8e6c9a5e95a296a3a7e26
                • Opcode Fuzzy Hash: 00f6d0f3771a8cfa98223a140d65de6735ec101d3a44d5ddd75e2d9def7749f0
                • Instruction Fuzzy Hash: A541583161464087EA62DB3AA4447AAB3A1FBD87E0F144712BB6D4B7F5DF39C802DB40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DC5C
                • SetFileTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DCE2
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$CreateTime
                • String ID:
                • API String ID: 1043708186-0
                • Opcode ID: 8a0a731fb1e22280383dc4c244850d697ffee92b9dbadae0b2290ba2595e9be9
                • Instruction ID: 944ab0cbe82d54181631abf043b2a82f72de4fdca767e43f24bb2c72b9c0c91f
                • Opcode Fuzzy Hash: 8a0a731fb1e22280383dc4c244850d697ffee92b9dbadae0b2290ba2595e9be9
                • Instruction Fuzzy Hash: 8D21B431214A4581EA72DB66A0407EA3795F78CBE4F184617EFAE077E5DF7AC806C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DC5C
                • SetFileTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DCE2
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$CreateTime
                • String ID:
                • API String ID: 1043708186-0
                • Opcode ID: d6d835041d1b41abb3b5fe648f8f275da576c4891ed88a603463ed8b7f508fb5
                • Instruction ID: bee1728ae0ee1a0caa625709e376bb4aadd3217f15d1bcce0d190476addee932
                • Opcode Fuzzy Hash: d6d835041d1b41abb3b5fe648f8f275da576c4891ed88a603463ed8b7f508fb5
                • Instruction Fuzzy Hash: BE21D332311A4581EA72DA66A0407EA3795B78CBE4F184527AF9D077E5DE7AC806C700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DC5C
                • SetFileTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DCE2
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$CreateTime
                • String ID:
                • API String ID: 1043708186-0
                • Opcode ID: 6bbc7cb38f56b555cae5d46dc9eb85d7f0e424b0d62445df59964c24eed4e9f3
                • Instruction ID: a00dbcca095f64b26cda9c271166364bdf2e86a9b80154192fb139b54d898421
                • Opcode Fuzzy Hash: 6bbc7cb38f56b555cae5d46dc9eb85d7f0e424b0d62445df59964c24eed4e9f3
                • Instruction Fuzzy Hash: 5521E532315A4581EA72DB62A0407EE3791F78CBE4F184517AFAD077E5DE7AC806C700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RegQueryValueExA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,000000014004890D), ref: 0000000140060D85
                • RegQueryValueExA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,000000014004890D), ref: 0000000140060DE8
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: QueryValue
                • String ID:
                • API String ID: 3660427363-0
                • Opcode ID: 0af55b123fcd85ad11f65efe4d0ac2719b06ecdcd8a99680970ae4064010c44f
                • Instruction ID: 09cc4365fb23fa9fe14c599ab373ea3e5ec1bde103bfdbf39ccb6e9a9538c2db
                • Opcode Fuzzy Hash: 0af55b123fcd85ad11f65efe4d0ac2719b06ecdcd8a99680970ae4064010c44f
                • Instruction Fuzzy Hash: F521A37671569046EF52CB56E8003AFA391EB897F4F184621BF9C07BE8EA38D582C750
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DC5C
                • SetFileTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,?,000000014005DF81), ref: 000000014005DCE2
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$CreateTime
                • String ID:
                • API String ID: 1043708186-0
                • Opcode ID: eb6f16229e65501cd5258548e2b4ff06530ad065b40e2a3bf9e2a9b945b11f61
                • Instruction ID: 68fcab11a3bde380270331896f94efb0ab36e54eb9d04e7f46ecdc112822b6b1
                • Opcode Fuzzy Hash: eb6f16229e65501cd5258548e2b4ff06530ad065b40e2a3bf9e2a9b945b11f61
                • Instruction Fuzzy Hash: 6821C132315A4541EA72DB62A0407EA3795F78CBE4F184627EFAD077E5DE7AC806C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: ComputerName
                • String ID:
                • API String ID: 3545744682-0
                • Opcode ID: 505a76da9390751f76a813a8bc9fce4b727984ade222f3073bfceff6bf9580dc
                • Instruction ID: 560481d37deeb2f3cc02cd101c0a384bc9ca8e36dca6fa428839860d024f360c
                • Opcode Fuzzy Hash: 505a76da9390751f76a813a8bc9fce4b727984ade222f3073bfceff6bf9580dc
                • Instruction Fuzzy Hash: EDA15D3271064099EB12EFB6C4913EE2365A7987C8F915126BF0D67AFAEF34C609C750
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CreateMutex
                • String ID:
                • API String ID: 1964310414-0
                • Opcode ID: 6be956e981540fc735b56164f72d0aea79e48331418f8fd9eaab398243b5d8cf
                • Instruction ID: 2cd33cf12082532a652157af79f02d7873b375395221c82c38bac87e111ef697
                • Opcode Fuzzy Hash: 6be956e981540fc735b56164f72d0aea79e48331418f8fd9eaab398243b5d8cf
                • Instruction Fuzzy Hash: 6E51B2326117408AEB66EB22A0013EE6291EB9DBC4F580535FF4E477E6DF39C802D790
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: FileFindNext
                • String ID:
                • API String ID: 2029273394-0
                • Opcode ID: ff4ac6c2ef48f38791092f6d6c449714fc18167456ec2ef2bc1084d7df7feef3
                • Instruction ID: fe48dd106ee2d63de4642147a978de6f9e341aec22c75ad1205c2678dbe1ece1
                • Opcode Fuzzy Hash: ff4ac6c2ef48f38791092f6d6c449714fc18167456ec2ef2bc1084d7df7feef3
                • Instruction Fuzzy Hash: 80115B7561034082FF76DA6691047E933E1EB697C8F051013EF59472E9EB36C8D2C751
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: EnumValue
                • String ID:
                • API String ID: 2814608202-0
                • Opcode ID: a3c12b60ccc1d223e9782810bc36042d204e1f874336debb41352ff4bff3a234
                • Instruction ID: 650aff04d41c3b1619de3e88208a4500c6b85af191ab70c767efd2679610bbe3
                • Opcode Fuzzy Hash: a3c12b60ccc1d223e9782810bc36042d204e1f874336debb41352ff4bff3a234
                • Instruction Fuzzy Hash: 1C112E72204B8486D7219F12E84039EB7A5F788B90FA89529EB8D43B58DF39D991CB44
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CreateHeap
                • String ID:
                • API String ID: 10892065-0
                • Opcode ID: 21b05e3ef22cad88cebd019d8e45e363c17e6ba0707ecabdd33f955b9f4b15ed
                • Instruction ID: 54976bf3431427af6da968cf6b263ec8d4a99ac7c2bea2f2fd5649cd882baac1
                • Opcode Fuzzy Hash: 21b05e3ef22cad88cebd019d8e45e363c17e6ba0707ecabdd33f955b9f4b15ed
                • Instruction Fuzzy Hash: B901D635706A8082EB528712FA4039A73A0F78C3C4F198524EF884B7A5EF38C8518B44
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: BoundaryDeleteDescriptor
                • String ID:
                • API String ID: 3203483114-0
                • Opcode ID: 7b0e43f28c4f526d6edd5220e1ccf75e5ddb2081b4342278c18d43c75b4d1ee9
                • Instruction ID: 7e2fcedd46cf55f04110c2a11ced308778be976df41b62f125aabd7639a18320
                • Opcode Fuzzy Hash: 7b0e43f28c4f526d6edd5220e1ccf75e5ddb2081b4342278c18d43c75b4d1ee9
                • Instruction Fuzzy Hash: 70F0F878A4730141FE6A63B354543A511821FCC7C4F0E8834AF095B7A6EE38CD518699
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,00000248D5F129A8), ref: 00000248D5F120A7
                Memory Dump Source
                • Source File: 00000000.00000002.273160012.00000248D5F10000.00000040.00000001.sdmp, Offset: 00000248D5F10000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: d8a3b2cfba543ebba0b398dd9d3a4264974bc5484a92f43f5d16dbbf91d5b3e5
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: 4D314972615B9086D790DF1AE454B5A7BA0F389BC4F208026EF8D87B68DF3AC442CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: 0020$0020$3050$3050$4040$GNOP
                • API String ID: 0-829999343
                • Opcode ID: 537da1a0c1bbc7e636232495bc2fdab7c2537f76630bc9218dea00809d8f4601
                • Instruction ID: 282167bc52f218920562f67345f8403ae15435ff558287d674a5e0b6e797f698
                • Opcode Fuzzy Hash: 537da1a0c1bbc7e636232495bc2fdab7c2537f76630bc9218dea00809d8f4601
                • Instruction Fuzzy Hash: 4172507261068195EB22EF26D8913EE6365FB983C8F804016FB4E475FAEF34CA45C750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: ERCP$VUUU$VUUU$VUUU
                • API String ID: 0-2165971703
                • Opcode ID: 203c99bb3d64071a34d91be2023c6ff0f734778017a54347eb9ef20583df3fc0
                • Instruction ID: a95f611128f1d5d13a9bca75b656ea52fec65ffdb08565925219bb8e60db198b
                • Opcode Fuzzy Hash: 203c99bb3d64071a34d91be2023c6ff0f734778017a54347eb9ef20583df3fc0
                • Instruction Fuzzy Hash: 2252BE727046848AEB6A8F6AD5503ED7BA1F3087D8F144116FF569BAE8D73CC981C700
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: SW$SW$SW$SW
                • API String ID: 0-1120820918
                • Opcode ID: 517e9c748c7166ea23e42337479b6e8f1bff1248af9cf0015b4bedbae01fd632
                • Instruction ID: 5271b3b9b35d550c8de01999338ba1aa790ab169e66fccb1d44a6718ff6f2241
                • Opcode Fuzzy Hash: 517e9c748c7166ea23e42337479b6e8f1bff1248af9cf0015b4bedbae01fd632
                • Instruction Fuzzy Hash: 4C026D3170160146EB62EB73D8603EE2396AB9C3C8F554925BB4D87BEAEF35DA01C310
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: GC,$GC,$GC,$GC,
                • API String ID: 0-2774350030
                • Opcode ID: 98649618faad92dfac345ced2ac743c97f2c410892ae2dd8dadb9da2da6be478
                • Instruction ID: dd0ba4053c6bdb050c0e262549aa376da4335980b2dde8bb0cc8774c9fa84b1c
                • Opcode Fuzzy Hash: 98649618faad92dfac345ced2ac743c97f2c410892ae2dd8dadb9da2da6be478
                • Instruction Fuzzy Hash: 39B14A3232168096EA16EB22D4513EFA765FBDC7C4F854425FB4E57ABAEE38C605C700
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: }*$}*
                • API String ID: 0-2047341001
                • Opcode ID: e9887d82a581d5bcb5ea5d841605ffb3677de7d06064effe96893209b5a6e0e0
                • Instruction ID: 7c281f25cbc51a2c663274e483e0a5d4adc9f9b548fde4e06667abda5a9e2262
                • Opcode Fuzzy Hash: e9887d82a581d5bcb5ea5d841605ffb3677de7d06064effe96893209b5a6e0e0
                • Instruction Fuzzy Hash: 6E03CB72201B8482EB26CF23D4543ED67A1F78DBC4F994416EF4A177A6EB3AC945C380
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: )8GV$)8GV$@
                • API String ID: 0-2802744955
                • Opcode ID: a3e8ee5ab549556569e9006b525bd9d1ac3761a68850dd604f4cfbeaa6d7384c
                • Instruction ID: d4403fa2ef2757ed15b0d897a8d3d48ae9d82dee7601a7ae60b507309942f45e
                • Opcode Fuzzy Hash: a3e8ee5ab549556569e9006b525bd9d1ac3761a68850dd604f4cfbeaa6d7384c
                • Instruction Fuzzy Hash: 8F326E72610A8095FB22EB72D8513EE6365FB997C8F940026BB4E476FADF34CA05C750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: */*$GET$POST
                • API String ID: 0-3233530491
                • Opcode ID: f5c0abb872f3f3a9c24645541f102443df8f6c01efe130de31add9333cb11604
                • Instruction ID: 6cf15a5ed41f927c804a0d4041fd2741414eb33ceb6b5d93e391305a3a4948eb
                • Opcode Fuzzy Hash: f5c0abb872f3f3a9c24645541f102443df8f6c01efe130de31add9333cb11604
                • Instruction Fuzzy Hash: 57125C72610A8196EB11EF72E8913DE6765F7883D8F904122FB4E57AAADF34C249C740
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: GC,$GC,${QN
                • API String ID: 0-3150587038
                • Opcode ID: fd0f7604477b89c46016288274ae5da6e1d22dae5e6d5d6e9033f3dbe6d447d0
                • Instruction ID: 9244b60d004d0bd22f383007071d62e4da67c70af0efad37e4d475a9577969ab
                • Opcode Fuzzy Hash: fd0f7604477b89c46016288274ae5da6e1d22dae5e6d5d6e9033f3dbe6d447d0
                • Instruction Fuzzy Hash: D851B3726017408AEB26AF72A0517DF3392EB98398F559529FB4E0BBE9DF39C401C741
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: 0$GC,
                • API String ID: 0-3557465234
                • Opcode ID: c501a18cd752f9cb014cd0278b4cdcaf861e6727db0c1722d954af001bda1d39
                • Instruction ID: 8e8f5bced65d739128878f1be46f709eb140c798bd495bd8ba2efbba04664ca7
                • Opcode Fuzzy Hash: c501a18cd752f9cb014cd0278b4cdcaf861e6727db0c1722d954af001bda1d39
                • Instruction Fuzzy Hash: 90F1C132705B8086EB56DB26A5503EE77A5F788BC8F544029FF8A47BA9DF38C845C740
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: cLpS$cLpS
                • API String ID: 0-581437482
                • Opcode ID: 34fd53aa0ebdbc9f7987fe69826bd589cd4ce70c6830deca293095981677af5c
                • Instruction ID: d6b56411a1e340b191dd7f08d0c8a8920ca136b0ade9766ce73097337fe28e3c
                • Opcode Fuzzy Hash: 34fd53aa0ebdbc9f7987fe69826bd589cd4ce70c6830deca293095981677af5c
                • Instruction Fuzzy Hash: F5916E32700A41A6FB12EB72D5513ED2366AB983D8F900126BF1D97AFADF34D919D340
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: D
                • API String ID: 0-2746444292
                • Opcode ID: 0452af0be93170f0712028ec6d1a4f1ed763d309de66f3c97f53239ecee0938c
                • Instruction ID: a2166a60d7ca2b4a0d1872d5e3506bb785f107662951e93f9f6f62b20c08bf0e
                • Opcode Fuzzy Hash: 0452af0be93170f0712028ec6d1a4f1ed763d309de66f3c97f53239ecee0938c
                • Instruction Fuzzy Hash: 32827E3222468186EB13EB26D4907EF6365FBD8794F904612FB5A47AFADF38C605C740
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: GET
                • API String ID: 0-1805413626
                • Opcode ID: 27aa1fcbf8bb0fd35ba8f1726e1321bde18c1ec1ebf4c6ce6eb5ba4c065116bb
                • Instruction ID: e67aa13565bd515be4758c424d677281e7e48e69fdea67d752e56d6b70eb8f16
                • Opcode Fuzzy Hash: 27aa1fcbf8bb0fd35ba8f1726e1321bde18c1ec1ebf4c6ce6eb5ba4c065116bb
                • Instruction Fuzzy Hash: 7182CFB262568082FB52EB26E491BEE6761F7C97C8F851022FB4A576E7CF38C505C701
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CloseEnvironmentExpandStrings
                • String ID:
                • API String ID: 1839112984-0
                • Opcode ID: 45e4f39da0bad21561b5064be163dd8534aff24f975c135ffc3a62d6c7fd4cf0
                • Instruction ID: c0dbe0ee55e83fb6c0f3bef3624a57e5635b4c6ed11a4d6c977be8f15ec7e338
                • Opcode Fuzzy Hash: 45e4f39da0bad21561b5064be163dd8534aff24f975c135ffc3a62d6c7fd4cf0
                • Instruction Fuzzy Hash: CB427E32710A4096FB12EB72D4913EE6765EB983D8F814422BB4D4BAFAEF34C645C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3a32b9ce1bb685620e39e08575ae203d18ff6a72e91932ff27c8b72503ae2f13
                • Instruction ID: abc698a25be580435ac5d46bd6b01b3c7dd535f90f9c32282677b8a643a0cbd6
                • Opcode Fuzzy Hash: 3a32b9ce1bb685620e39e08575ae203d18ff6a72e91932ff27c8b72503ae2f13
                • Instruction Fuzzy Hash: 3C427D3271068095FB22EB76D8513EE2361EB993C8F904121BB0E5BAFAEF79C545C740
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3bc47b23165564b486feb3c8182ff2dab583dad21220a6b85b8bd8ac1698894f
                • Instruction ID: 0bcce83d19b55e388762cc41cc2fbdfa61478623d1bee2f25155124e52c32027
                • Opcode Fuzzy Hash: 3bc47b23165564b486feb3c8182ff2dab583dad21220a6b85b8bd8ac1698894f
                • Instruction Fuzzy Hash: 8A128E3271468095FB22EB72D8913EE2355EB997C4F804026BB4E5BAFADF35C605C750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: cLpS
                • API String ID: 0-2886372077
                • Opcode ID: 39b3e9410c272ead3331ad6fef3a5a390c12b147565654b66b7ca87bf70ff1a0
                • Instruction ID: 96b4c198141fe6e7034ab14ad9d5ea3cda72442e6a1109ae0a48173783152c86
                • Opcode Fuzzy Hash: 39b3e9410c272ead3331ad6fef3a5a390c12b147565654b66b7ca87bf70ff1a0
                • Instruction Fuzzy Hash: CF528D7272464092FA12EB62E8517EE63A5FB9C7C4F814022BB4E57BBADF38C505C750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CreateMutex
                • String ID: m
                • API String ID: 1964310414-3775001192
                • Opcode ID: 079af9642e33be8b1418e23995d0953d3028e11a16e9caecd14c6a2ac72b7534
                • Instruction ID: 0a9d90af75a6ede7406656d6adb6787827cf479cbe6b14872f7c626c13ea0b6d
                • Opcode Fuzzy Hash: 079af9642e33be8b1418e23995d0953d3028e11a16e9caecd14c6a2ac72b7534
                • Instruction Fuzzy Hash: 6A529B32710A80A6F74EEB32C5913EE7369F788384F904026AB2947AE6DF34D576C750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: s( j
                • API String ID: 0-1450404818
                • Opcode ID: 19985d2dc72a707ec5f83c91129fc97538500d80b5f4466283615156a38f1139
                • Instruction ID: 6f5b3d0b06e06ce3defbe5b62ba999e8dce43b7996f1ec96da6707378b1ebcba
                • Opcode Fuzzy Hash: 19985d2dc72a707ec5f83c91129fc97538500d80b5f4466283615156a38f1139
                • Instruction Fuzzy Hash: 14325632715B9085EB16EF66D8513ED73A5FB88B88F454026EB4E5BBAADF38C505C300
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CloseEnumValue
                • String ID: kw9b
                • API String ID: 858281747-837114885
                • Opcode ID: 8fe5edd6d85ef5fb81b21d913d03357e3fdb124ed1fc83b54cb0e6b95d0cba36
                • Instruction ID: a79da12e532d7eb86b4034213f2927d281404f76e1d3d8be4d202bd2a10f559e
                • Opcode Fuzzy Hash: 8fe5edd6d85ef5fb81b21d913d03357e3fdb124ed1fc83b54cb0e6b95d0cba36
                • Instruction Fuzzy Hash: D622A03270064056FB22EB62E4513EE6361EB8C7D8F814625BB4E57AFADF38CA05C750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: U
                • API String ID: 0-3372436214
                • Opcode ID: c7c17b4a929c8fca42997e9228a0bf0b46a1d4db9eb13a9c52e903abf607145f
                • Instruction ID: 04dcf981b535b3d5a04f4e0f983876b723d65533687fb2a3abc72c4897885b35
                • Opcode Fuzzy Hash: c7c17b4a929c8fca42997e9228a0bf0b46a1d4db9eb13a9c52e903abf607145f
                • Instruction Fuzzy Hash: 7A22A032714A8095FB22EB76D4913EE2761EB993D4F900122BB4E5BAFADF38C545C710
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: Content-Type
                • API String ID: 0-2058190213
                • Opcode ID: cd802d8b45f15130d3c27f80ef655ed1c5064d239956586ea4d9a7fa25c30ca4
                • Instruction ID: 8ed0294b40edec3e111ebf6e63eddced9ff886ac8d86313f53d4d34ac86a637b
                • Opcode Fuzzy Hash: cd802d8b45f15130d3c27f80ef655ed1c5064d239956586ea4d9a7fa25c30ca4
                • Instruction Fuzzy Hash: D0128B7271064096EB26EB72D0953EE63A5EB9D7C8F804029FB4E576B6DF34C909C341
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: Close
                • String ID: 0
                • API String ID: 3535843008-4108050209
                • Opcode ID: 5efda3073f98ba850d64a6a6b6fb973051fc5223a8b2b59b7862bd26d1a0a119
                • Instruction ID: 021d52728ad99ff4b45c00a2ee63d530dbb35c35c3e7b67721d4418a9cae59c0
                • Opcode Fuzzy Hash: 5efda3073f98ba850d64a6a6b6fb973051fc5223a8b2b59b7862bd26d1a0a119
                • Instruction Fuzzy Hash: A4D1483271064185EB22EB66D8503EF6365FB987C8F944421FF4E57AAAEF34CA05C340
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: 13b354268872ef66367d09f0eaf7f41c1b6cce90139d1ccde9a6c23eddc411d2
                • Instruction ID: 091f4e73938a5afec608f70625f4eed5baac112ec883e15b973b01c59944fd94
                • Opcode Fuzzy Hash: 13b354268872ef66367d09f0eaf7f41c1b6cce90139d1ccde9a6c23eddc411d2
                • Instruction Fuzzy Hash: 8FB1903271164156FB26EB72C0513EE2365A78C7C8F554429BF0E67BEAEE34D906C350
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: 266006fd5134fcae821d54f81f057cdba6f5be873c6199ef93d4c42334c526d2
                • Instruction ID: 79bcb73a3e0a748e54816e3c2b9a8955141e4b7d1d3c260807ef7fd3e9233e09
                • Opcode Fuzzy Hash: 266006fd5134fcae821d54f81f057cdba6f5be873c6199ef93d4c42334c526d2
                • Instruction Fuzzy Hash: 4681AF3171528042FA66AB63A5513EE6382BBDC7C0F954839BF0E57BEADE38C9019750
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: tI*k
                • API String ID: 0-257501792
                • Opcode ID: b15996fbae463eef0efc9f4e5c4cbf386dde064011b2806a6f0ecd12f6b98297
                • Instruction ID: 2b3e36108f388e75195695150bf3b7502d87346db4925aa772ee75e92517338c
                • Opcode Fuzzy Hash: b15996fbae463eef0efc9f4e5c4cbf386dde064011b2806a6f0ecd12f6b98297
                • Instruction Fuzzy Hash: C891B332710A41C6FB12EB73D4913ED2365AB987C8F815026BF0E67AABDE34C605C391
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID: ERCP
                • API String ID: 0-1384759551
                • Opcode ID: 9a8959bd3d8286152fe3b07e5e9b9c99826fd1463cb640f02497020a3b8cf481
                • Instruction ID: 36d71a898891e4cfc692b0c24b63e4f8a605753b41eb4ec31f3d0d909baacb04
                • Opcode Fuzzy Hash: 9a8959bd3d8286152fe3b07e5e9b9c99826fd1463cb640f02497020a3b8cf481
                • Instruction Fuzzy Hash: 8541C2677244554AE3189F2598213BE2391F7E8781B008838BBC7C3B99E97CCE41C754
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dcdaca1a3c271cd417c85bb097e58509ad96e32764cb2952681562445dcde157
                • Instruction ID: fc2f62d5942ef41123ea32f2955be4f6aadf7052ab01c2248917173129c7cd0f
                • Opcode Fuzzy Hash: dcdaca1a3c271cd417c85bb097e58509ad96e32764cb2952681562445dcde157
                • Instruction Fuzzy Hash: 8A82BD72301B8486EB269F23D4503EE67A5F78DFC4F964022EB4A577A6DB38C945C384
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d7250f98c0d712e4fed8a9177b7990c03dbf5da58cb0dd37bc7f0a46ed34db0c
                • Instruction ID: b1defcb4bfd3908c290bb80924a7f4486985742b072abc47c5e9bd5be53152ef
                • Opcode Fuzzy Hash: d7250f98c0d712e4fed8a9177b7990c03dbf5da58cb0dd37bc7f0a46ed34db0c
                • Instruction Fuzzy Hash: FF72CE32601BA482EB26CF17E4503ED77A5FB99BC8F9A4016EB49477B6DB36C941C340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0b6290f3f4936625c1500c9bb5ab49f73b0f0e92f6783c0cfd327242af27f29f
                • Instruction ID: 8249503d4e55669e8e7119aec1729776b7b2f3ca46fae70a891a003f6664f3d4
                • Opcode Fuzzy Hash: 0b6290f3f4936625c1500c9bb5ab49f73b0f0e92f6783c0cfd327242af27f29f
                • Instruction Fuzzy Hash: 3472DF32201B9486EB26DB17E4603ED77A5FB9DBC5F894012EB4A477B6DB3AC941C340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$PointerRead
                • String ID:
                • API String ID: 3154509469-0
                • Opcode ID: 4bce802a55eded36f570ef6d01a06ef35652310067493a148248f362802968e3
                • Instruction ID: 4fdb0601fab6f7a848b28641239d596080eab1ec2c6ff824b21f12e2ef69b5a1
                • Opcode Fuzzy Hash: 4bce802a55eded36f570ef6d01a06ef35652310067493a148248f362802968e3
                • Instruction Fuzzy Hash: 48722D32724A4095EB02EB76D4913EE6765EB983C4FC05012BB4E879BBEF38C649C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bbf02e0b346a645ce41284f4b25ae6de0e0561089bc0c4212f6de5587c4ccb21
                • Instruction ID: d53d10191d1a85c044aba7f3ec212ac92ce5176a248edb2932ce54add84afe44
                • Opcode Fuzzy Hash: bbf02e0b346a645ce41284f4b25ae6de0e0561089bc0c4212f6de5587c4ccb21
                • Instruction Fuzzy Hash: 9D52BE72601B8081EB269F23D4543EE77A1F78CBC4F8A5426EB4A577B6DB38D845C348
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dd1d6ac494662c45c571e96f77a6e8211c4f0b163f6c515dcb42af03e52a945a
                • Instruction ID: 9c06e88039ccf999e040ad7794a2e2d02b6699145a9792014979c24fd1337f6c
                • Opcode Fuzzy Hash: dd1d6ac494662c45c571e96f77a6e8211c4f0b163f6c515dcb42af03e52a945a
                • Instruction Fuzzy Hash: B4623CB76206548BD7668F26C080B6C37B1F35DFA8F25521ADF0A43799CB39D891CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c541702096c1ae675d9f8552b841f1df762d73269a6d039e8a3e529e919bb3f5
                • Instruction ID: acd1ff4a64a9c803ec812a22a8ce79600e1464d52fdb42fb628072365476121f
                • Opcode Fuzzy Hash: c541702096c1ae675d9f8552b841f1df762d73269a6d039e8a3e529e919bb3f5
                • Instruction Fuzzy Hash: 64429E31301A8141FA23EB6698513EF6391EB8C7E8F544616BF5A5BBEAEE38C505C340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fc2a6e3d2e1231b3fe707f0d0f35a30ce2f56e53bfff03d4db06bbddff5caabd
                • Instruction ID: 78f3400fd7e206f6a511ea736ed45412fb3e7259efd4ed926287f6c9bd4c6aa7
                • Opcode Fuzzy Hash: fc2a6e3d2e1231b3fe707f0d0f35a30ce2f56e53bfff03d4db06bbddff5caabd
                • Instruction Fuzzy Hash: E6427C32204A8096EB66EB32D0513EE67A4E79D3C8F914026F79A876F7DF38C945C741
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 44882556ec0b6035508ab17f7b7fd4b756285181e69dc9f77d466bd3c4569491
                • Instruction ID: 8108868c1ca7c4f1afbe8bd34af9d7f1e96dfbbf12b1edd0cffad3fdf1fa0b6f
                • Opcode Fuzzy Hash: 44882556ec0b6035508ab17f7b7fd4b756285181e69dc9f77d466bd3c4569491
                • Instruction Fuzzy Hash: 3F429E3231068095FB22EB72D8913EE6765EB983D8F844122BB0D97AFADF34C645C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 060d71c651ab3aed04444553114f4ea5a7531cc3ca58c37faf4133b09f387ec2
                • Instruction ID: 183f2e46b23aa86a2c091461a645f9a581571388db0d92becfc597eb429af356
                • Opcode Fuzzy Hash: 060d71c651ab3aed04444553114f4ea5a7531cc3ca58c37faf4133b09f387ec2
                • Instruction Fuzzy Hash: 0732AB3271064089EB16EB36D4513EE27A5EB8CBD8F555126FF0E877BADE38C4868340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: baf04223ec18bb60842fe7fa632ea836e81c8b6d6b17b3371276cc931bd38ff2
                • Instruction ID: 71edd40f2b1ab928f6f3b4ddf8d26af45cb7d1258c95c78617a62a1a74f3288a
                • Opcode Fuzzy Hash: baf04223ec18bb60842fe7fa632ea836e81c8b6d6b17b3371276cc931bd38ff2
                • Instruction Fuzzy Hash: BF32AC3261068195EB12EB26D4913EE2765FB983C8F814122FB4E57AFBEF38C645C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e8328b10af82aab1ef65ff433d7820bced4cba86e0066b221c3c838f9fd1e431
                • Instruction ID: 3ba19fba285517c5acd5c21b3c9b7592edaf423ca2de06bba8230fcf7af2400b
                • Opcode Fuzzy Hash: e8328b10af82aab1ef65ff433d7820bced4cba86e0066b221c3c838f9fd1e431
                • Instruction Fuzzy Hash: 3C429B72624A8095FB12EB62D4957EE2365FB983C8F814022FB0D57ABBDF34C649C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7ee38f4c6dee734349d5b0dcc202e437ae908f573234f4aff5f510a5883c84b0
                • Instruction ID: eb795f204498a8d956ef0de19ff8bd43d97085c04d8ed5933d3115b51340510f
                • Opcode Fuzzy Hash: 7ee38f4c6dee734349d5b0dcc202e437ae908f573234f4aff5f510a5883c84b0
                • Instruction Fuzzy Hash: 7022793270064186EA23EB2AD4957EF63A5EB88BD4F554626FF0A477F6EE34C506C340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1e8d1907d2a62ce1ae108db488a351868ceb64fffc9dd42578434a0f34ae656a
                • Instruction ID: 697e8bd1027fccc09012cb901671f32632dfdae7722e2c733c5167ca59ce0a7a
                • Opcode Fuzzy Hash: 1e8d1907d2a62ce1ae108db488a351868ceb64fffc9dd42578434a0f34ae656a
                • Instruction Fuzzy Hash: AE227C3271064186EA23EB26D4513EF63A1FB89BD4F544625EB4A577F6EF38C50AC340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 71b3dc1032e7b852d429d3288fc6d56ff3ef19d98c02d1d103b4f123b92fc1f1
                • Instruction ID: 5c003effdee5129b35cf12aebe167f862a01b0c8d0d2f43ab9f1123e32a30f31
                • Opcode Fuzzy Hash: 71b3dc1032e7b852d429d3288fc6d56ff3ef19d98c02d1d103b4f123b92fc1f1
                • Instruction Fuzzy Hash: 8C0203B21082A489F7768B26C9413FA7BE2E759788F254906FB8A435F5D738C9C1D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2e375be9be99e9838cc7803ed6e7672458d2ec84ccfc9a0c18b017f9565b827c
                • Instruction ID: c2c66f55aa66479377f68c186b881699d763759fa92e2ffabb716b860ed1a50b
                • Opcode Fuzzy Hash: 2e375be9be99e9838cc7803ed6e7672458d2ec84ccfc9a0c18b017f9565b827c
                • Instruction Fuzzy Hash: CD224D72710A8091EB12EB72D4913EE6765FB987C8F904116FB4E876BAEF38C245C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f513173c25ae17789a403cea68c9e18d94625c6d02a52581dcb230289bad16b3
                • Instruction ID: 217fabc6e38e1d640ccd999207fddb20e056db183073941d35cbdb4b11e649c3
                • Opcode Fuzzy Hash: f513173c25ae17789a403cea68c9e18d94625c6d02a52581dcb230289bad16b3
                • Instruction Fuzzy Hash: 10229B72620A8091EB12EB62E4957EE2365F79D7C4F814022FB4E576BBDF38C609C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ed167cb2d41bf65051b1e1e6ca4fc372791feb4efe79826a7b7afb1d034e643
                • Instruction ID: 3448a1cfdf5732c1482eebf940cb1862e5db89764351cf67f11e8459266109f6
                • Opcode Fuzzy Hash: 6ed167cb2d41bf65051b1e1e6ca4fc372791feb4efe79826a7b7afb1d034e643
                • Instruction Fuzzy Hash: CD026C727006418AEB12DF26D4907EE73A6F788BC4F614525EB0E977AADF34D90AC740
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8296aae514971c10519780c04e533f569930ad849b100b0340065f0f39cb86db
                • Instruction ID: a963730c34943060851cd64ea719675db259de8104656558a9074d2de6a51302
                • Opcode Fuzzy Hash: 8296aae514971c10519780c04e533f569930ad849b100b0340065f0f39cb86db
                • Instruction Fuzzy Hash: 41128F7222468096FB52EB22D4917EE6765FBD93C8F811022FB4E57AABDF38C505C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$ClosePointerRead
                • String ID:
                • API String ID: 2610616218-0
                • Opcode ID: bc4fe18ed797083e74f4d5cd17e8a6e4e1d5126150df91a93b346629e9c3d65f
                • Instruction ID: 5afa6d75f76fbbc9d7f53df6043056336d1db5d7591574d5123318d553f9c856
                • Opcode Fuzzy Hash: bc4fe18ed797083e74f4d5cd17e8a6e4e1d5126150df91a93b346629e9c3d65f
                • Instruction Fuzzy Hash: 19124E3272469096EB12EF72D8913DE6765FB987C8F815022BB0D57AABDF34C605C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$PointerRead
                • String ID:
                • API String ID: 3154509469-0
                • Opcode ID: 6fe5d38ad1f8690ed4216c8729f4cdddbe586800c401b9c27fb863a53c2b00d8
                • Instruction ID: ac8bef764291a5126b18a53dad73757551fec454a5992e6944e07fe4b855ac86
                • Opcode Fuzzy Hash: 6fe5d38ad1f8690ed4216c8729f4cdddbe586800c401b9c27fb863a53c2b00d8
                • Instruction Fuzzy Hash: 2A023B32724A80A2FB52EB72D4913EE6764FB983C4F815022BB4D57AEADF35C545C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4119716334bae8ce4a12a511c9ef3e68b40bfa4d08e13555b81686db08763198
                • Instruction ID: b67327a95b15ec145a913cc43aeca3e3a8a77925bd43874970612b3ea802a6ff
                • Opcode Fuzzy Hash: 4119716334bae8ce4a12a511c9ef3e68b40bfa4d08e13555b81686db08763198
                • Instruction Fuzzy Hash: A802707272064095EB02EB66D4913EE6765FB987C8F905022FB4D83ABBEF34C649C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$PointerRead
                • String ID:
                • API String ID: 3154509469-0
                • Opcode ID: 4f031dda890f5b6590393d19acee77402144b9c4bbfec744419d7f2e8af65a5e
                • Instruction ID: 5d574d698b33f004de0812fa71b34c36bbdae31478704d480fb686f148b39898
                • Opcode Fuzzy Hash: 4f031dda890f5b6590393d19acee77402144b9c4bbfec744419d7f2e8af65a5e
                • Instruction Fuzzy Hash: EB024C72324A8096FB12EB62D4913EE6765EB983D4FC15022BB4E57AEBDF34C605C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ae8c2c1811faa848f940e4a298acd31fbb5db82ef74365df61737aab6befccc0
                • Instruction ID: d38a929efe70148cd0bcafb05e8c0916e90d43f0c382b2c9e415ecaf47ade149
                • Opcode Fuzzy Hash: ae8c2c1811faa848f940e4a298acd31fbb5db82ef74365df61737aab6befccc0
                • Instruction Fuzzy Hash: C8F16D32610A8095FB12EB76D8513EE6365EB983D8F940521BB0E57AFBEF35C605C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d8f91d721c478637f80766b80e37fef242b82150883bd374cc6845ff3be0a72
                • Instruction ID: f0fb79f68922493fed5bc905321703954c20a875d362dace52344ff7232635a8
                • Opcode Fuzzy Hash: 8d8f91d721c478637f80766b80e37fef242b82150883bd374cc6845ff3be0a72
                • Instruction Fuzzy Hash: D7029272320AA19AEB42DF36C8917EE2724F748789F805016FF4B57AAAEF35C545C740
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$ClosePointerRead
                • String ID:
                • API String ID: 2610616218-0
                • Opcode ID: 5ad00df89051eaa49967073b66a19c6f1da8073d71a21332a449de5316238ce7
                • Instruction ID: 9c3e8f75c9e591130820bb2956cb3806339feb13e112d9af22726fcddd3bd126
                • Opcode Fuzzy Hash: 5ad00df89051eaa49967073b66a19c6f1da8073d71a21332a449de5316238ce7
                • Instruction Fuzzy Hash: 12026C32314A8095FB52EB72D4917EE2765EB983C4F805022BB4E97AEBDF35C649C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 46e6d31ae123d367ae286cc33ede5adb79100aa8ca1f635c4c03776b42ffb831
                • Instruction ID: d0d419901b6e3c3183ee3913f1137c5e588d0fadc92f77f7791849e6aeb29d3b
                • Opcode Fuzzy Hash: 46e6d31ae123d367ae286cc33ede5adb79100aa8ca1f635c4c03776b42ffb831
                • Instruction Fuzzy Hash: 8A029132614A8095EB22EF32D4913EE6765FB98388F904412FB4E57AFADF34C649C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e2a271461545f8d7b832081a624fb0379c86db8b71a6fcc540a55edf685f09f5
                • Instruction ID: fccd9241a873054b7c24d42fb58abb6f012b2f7f19fe3a4c061a127f88627f2a
                • Opcode Fuzzy Hash: e2a271461545f8d7b832081a624fb0379c86db8b71a6fcc540a55edf685f09f5
                • Instruction Fuzzy Hash: 41E18E3271068095FB12EB76D8917EE6765EB983C8F804021BB0D5BAEBEF35C645C740
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9b6f1b094effc9f245018c12fb0bd54aed54c11f9143a05f6df0da17f49fd19b
                • Instruction ID: 02ee9b89192d395c78975687d30e6fb06be8b995001c736011e159ca0d17724c
                • Opcode Fuzzy Hash: 9b6f1b094effc9f245018c12fb0bd54aed54c11f9143a05f6df0da17f49fd19b
                • Instruction Fuzzy Hash: E2E13D32714A4095EB02EB66D4913EE6765FB983D8F900012FB4D97AFAEF34CA49C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e31cd9d0c2abe67ba1f982af43b8ae355da1bd35b9ac6401d5f88127279679d0
                • Instruction ID: 95da75048f27146dafc5de9d612871b80806eb61125b8034b1f63b71f4cba504
                • Opcode Fuzzy Hash: e31cd9d0c2abe67ba1f982af43b8ae355da1bd35b9ac6401d5f88127279679d0
                • Instruction Fuzzy Hash: 47F12C3262498096EB12EB62D8513ED6365FBD8388F814522BB4E479FBEF74CA05C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 88ffde5285e374d450e796d5cd304a5fa7d017e996fe3ac39e62eede96bb0df1
                • Instruction ID: cf5fdc312f2229dc6ff813412d90ddbabd12b8e4de7574aebc9877f7d05b411a
                • Opcode Fuzzy Hash: 88ffde5285e374d450e796d5cd304a5fa7d017e996fe3ac39e62eede96bb0df1
                • Instruction Fuzzy Hash: 28D19032711A4195EB12EB76D4903EE23A1EB993C4F844425BF4E57BEAEF38C605C350
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 16253b5d55ff71ace7e49d720cc951c571e11621ee8e21fa8c6a30ce5dfdcbdc
                • Instruction ID: bf23390ce128f79092fde7b2b9043ef6653a4f1b38eae35900255c6e9c132ad5
                • Opcode Fuzzy Hash: 16253b5d55ff71ace7e49d720cc951c571e11621ee8e21fa8c6a30ce5dfdcbdc
                • Instruction Fuzzy Hash: ABC1D4231282D04BD7569B3764503FAAE91E79A3C8F280655FFC997AEBD63CC2149B10
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f12721fbfba6283dc7958c84227ce6bb15a7590cb07e0c84499cdb4845d6b172
                • Instruction ID: d0d512be425b72175eef7d799d9923e381f6a995b1e0446f0295c878f1c0c086
                • Opcode Fuzzy Hash: f12721fbfba6283dc7958c84227ce6bb15a7590cb07e0c84499cdb4845d6b172
                • Instruction Fuzzy Hash: CED13972724A4091EB02EB76D4913EE6765F7983C8F904016BB4D97ABAEF38C605C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: da2952e0823b3d5a59f73c7ab384f762a6d9a624e53a469d815e2d2c0d7a72ca
                • Instruction ID: 96955b53f7f5b4430e01eb0035ad3df088e7672fa3a311151148bede835f9000
                • Opcode Fuzzy Hash: da2952e0823b3d5a59f73c7ab384f762a6d9a624e53a469d815e2d2c0d7a72ca
                • Instruction Fuzzy Hash: E7C16136B0564089FB22EB76D0613EF27A1AB9C388F554425BF4E976FADE34C506C740
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: FileFindNext
                • String ID:
                • API String ID: 2029273394-0
                • Opcode ID: f2e071e7f6ab674ec47851a4750d1b7c0b6bf997477befec93a155f2d50e3c60
                • Instruction ID: 08807915bc927436db1a901aa043915a979950c5e23cf508b5f0d65b77d78aa9
                • Opcode Fuzzy Hash: f2e071e7f6ab674ec47851a4750d1b7c0b6bf997477befec93a155f2d50e3c60
                • Instruction Fuzzy Hash: 0CD17032614A8096EB02EB26D4513EE6364FBD97C4F815122FB4D57AEBDF38CA05C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29c98a7c03b056bf897b50c999e530441a062f43ea8ff7e63b9bd448889a0739
                • Instruction ID: f96005f1b71c62cd91ec633b0fa556b6f093996ab6e40a041e3cbd638a23d0d9
                • Opcode Fuzzy Hash: 29c98a7c03b056bf897b50c999e530441a062f43ea8ff7e63b9bd448889a0739
                • Instruction Fuzzy Hash: C1C1BD3270164096FB12EF76D4413ED23A4EB883A8F484622BF2D57AE6EF38D955D350
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 005ad93020e0817431c5e85dbe6d11178de2602f8c4bd9af456519582a9ff990
                • Instruction ID: 38de139323f3e079e5738bdd278af51575638bb101dd3218b17e6965c0953cb4
                • Opcode Fuzzy Hash: 005ad93020e0817431c5e85dbe6d11178de2602f8c4bd9af456519582a9ff990
                • Instruction Fuzzy Hash: 1DB16A3671062094FB46EBA2D8A17DE2365BB89BC8F825025FF0D67BA7DE38C505C354
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f425d040841da7f8aca5576ff87e7ae9262ef18f39f843680b29a7b76c8902f7
                • Instruction ID: bfe4e87f351d28bd3d3693bc96d2151355ab9388d993d4a46e39ffd0a3f78ad6
                • Opcode Fuzzy Hash: f425d040841da7f8aca5576ff87e7ae9262ef18f39f843680b29a7b76c8902f7
                • Instruction Fuzzy Hash: E6C16332704A809AFB22EBB2D4513EE2365AB9C3D8F854521BF1E676EADF30C505C354
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bcfd4a30f1a27aef1054c36b1d99c0610af0cc08103e55e4b01f0e7caa7c836f
                • Instruction ID: f23c3879964f3f83b961310f1bad7f7be1ef7afa2b68ec7d59790f469601a501
                • Opcode Fuzzy Hash: bcfd4a30f1a27aef1054c36b1d99c0610af0cc08103e55e4b01f0e7caa7c836f
                • Instruction Fuzzy Hash: A9A10231211E8145EBA79A2798543EF27A6AB8C3D4F645825FF0E5B6E9EF34C901C700
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 16274a22d167cb7459d5025cfc47ed7afc639167fa2c9c1057ca1fd72c03709f
                • Instruction ID: c0d98bc7e162404dc537a7c1af49e5fbe25e03b535df8b2493956c53732576b9
                • Opcode Fuzzy Hash: 16274a22d167cb7459d5025cfc47ed7afc639167fa2c9c1057ca1fd72c03709f
                • Instruction Fuzzy Hash: B2A114F31182A486FB778A2685413FA7FE2E719789F254402FB8A435F6C63CC985D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 39a77b3ded0776d671925a3aad9e7cc492f01908de9f9e7db45f2ad695b1e2ca
                • Instruction ID: d17e179c4ad3c1814a715198efb3da372d22ab0628f3c9d9f6a3a053a6971865
                • Opcode Fuzzy Hash: 39a77b3ded0776d671925a3aad9e7cc492f01908de9f9e7db45f2ad695b1e2ca
                • Instruction Fuzzy Hash: 79A1903271164045EB22EB7298507EE67E6AB9C3C8F550925BF4D47BEAEF34CA068310
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8bb3ae0ca8b09634f6b3eb7f35d10a75bd1e51e3d218a5b4533eb8f41dc86bd2
                • Instruction ID: 7cb660c1bafc6db3c15f0a4866a94b05aa7759728bb06ab0739d07cd917ce7e2
                • Opcode Fuzzy Hash: 8bb3ae0ca8b09634f6b3eb7f35d10a75bd1e51e3d218a5b4533eb8f41dc86bd2
                • Instruction Fuzzy Hash: 33B18C7262464191EB12EB62E4913EE6365FB9C7C4F801022FB4E47ABBDF38C649C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dc8327572ae460ec67bee7642bc1df1dfc8e00bf19c98c3d2f0bb37742338d2b
                • Instruction ID: ff1b56ecf022c2229069a5389c0477a62f006b84fd5f9f69eebb894724ab9066
                • Opcode Fuzzy Hash: dc8327572ae460ec67bee7642bc1df1dfc8e00bf19c98c3d2f0bb37742338d2b
                • Instruction Fuzzy Hash: 44A125F21182A489FB778A2685413FA7FE2E719789F254402FB8A435F6C23CC985D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 92fc6e297697f72d3d55b197ac04fe50775a4f95a26f4c9e919e5e137ab98750
                • Instruction ID: f965aa676d2cc64f6a485257af634002c7fef1377d4791c8bed9b1b7e56d6411
                • Opcode Fuzzy Hash: 92fc6e297697f72d3d55b197ac04fe50775a4f95a26f4c9e919e5e137ab98750
                • Instruction Fuzzy Hash: 79A115F31182A489FB778A2685413FA7FE2E719789F254402FB8A435F6C23CC985D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1e075c1df208aa39fb877a834bfc4403f559291216783e55fb63477ae2eadfdc
                • Instruction ID: 86c182e730ead1fa639f737d8458d4edb1cdee6041daaa12aedc2aef895c7c0c
                • Opcode Fuzzy Hash: 1e075c1df208aa39fb877a834bfc4403f559291216783e55fb63477ae2eadfdc
                • Instruction Fuzzy Hash: 83A115F31182A489FB778A2685413FA7FE2E719789F254402FB8A435F6C23CC985D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b68406ce4345875cbc0110dbe212228596ffa7fd34d07f9d141f7f6a9cf54bfa
                • Instruction ID: 7a8579acbe1e06e5dcc528155c10978c06d1d02f61772b3afab02cdca005db6d
                • Opcode Fuzzy Hash: b68406ce4345875cbc0110dbe212228596ffa7fd34d07f9d141f7f6a9cf54bfa
                • Instruction Fuzzy Hash: 3EA115F31182A489FB778A2685413FA7FE2E719789F254402FB8A435F6C23CC985D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 20a2fa5d4e375044cfc16d96b5b502da69406d12098659286745a9d4aecf6a6c
                • Instruction ID: 9b5f4d2890da7bc9148b0c777fb781a5a0913674a9f0c1f21bc34f13756e8484
                • Opcode Fuzzy Hash: 20a2fa5d4e375044cfc16d96b5b502da69406d12098659286745a9d4aecf6a6c
                • Instruction Fuzzy Hash: 37A114F31182A489FB778A2685413FA7FE2E719789F254402FB8A475F6C23CC985D720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f08ee0d756057847edd0d181a5b9af1eeafec0c3c2ab46f94514504cf2ba2413
                • Instruction ID: 9e8436de532ad8a8b9d83a7ce7f67d33a1e65f1b543d517c902b78be038a8119
                • Opcode Fuzzy Hash: f08ee0d756057847edd0d181a5b9af1eeafec0c3c2ab46f94514504cf2ba2413
                • Instruction Fuzzy Hash: 6FA19F3271464095EB22EB72D4913EE63A5A78C7C8F914426FF0D57AFAEE38C609C750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b042d90c0f8c1feaf42d72467fc8ea1d5898c5b9afd74594c11dc23e78b13021
                • Instruction ID: 891caef274385c1d9a1a05b5f8e139ad0eea2bdcde326525a3acf11d5ee056db
                • Opcode Fuzzy Hash: b042d90c0f8c1feaf42d72467fc8ea1d5898c5b9afd74594c11dc23e78b13021
                • Instruction Fuzzy Hash: 79918D7270164095EB16EF66E4507EE23A5ABDC7C4F448425BF4E97BA6EE34C906C340
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2f7007dcec79cbd028848c0e6b5f903ec75487d0d5c02af892f7002b917e7028
                • Instruction ID: 09ec91f3f7d35e473cfa3e72b303784d96220d522314983c3d838af10b8059fe
                • Opcode Fuzzy Hash: 2f7007dcec79cbd028848c0e6b5f903ec75487d0d5c02af892f7002b917e7028
                • Instruction Fuzzy Hash: C4A16E32314A8095FB22EB72D8513EE2365EB987D4F940426BB4D57AFADF34CA05C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ce67bfafa3a41e60d72f08d4a165a2184096e63d57257d43e1b540ba17e5e704
                • Instruction ID: 9282ef7f3f2e177ec3162a27807bc3d77d508fe5c2bed51c5ff564ba7b898efa
                • Opcode Fuzzy Hash: ce67bfafa3a41e60d72f08d4a165a2184096e63d57257d43e1b540ba17e5e704
                • Instruction Fuzzy Hash: 99912232B15A4099FB12EBB2D4913ED23659B9C7C8F814525BF0DA76EBEE34C609C350
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: 32bffcc2ddfcb3d691dc0d2c9b892c77d94147a7b8145dc7682b20892f7e7318
                • Instruction ID: a01e236db0e61280ae7bc249da652572acbbc64743681568c883ee8cb5c556df
                • Opcode Fuzzy Hash: 32bffcc2ddfcb3d691dc0d2c9b892c77d94147a7b8145dc7682b20892f7e7318
                • Instruction Fuzzy Hash: D7916C3272468092FB12EB62D4957DE6365FB9C7C4F811022BB4D43AABDF78C544CB10
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9bec047f33ee0572188590f4278c6d3b9bee721e36306d1774188d0e8c9170a8
                • Instruction ID: 2085d5fbde7ab3b46fd7c59f247d5158c6ccb74e37f4a5dfc0e2ff2c0c09d730
                • Opcode Fuzzy Hash: 9bec047f33ee0572188590f4278c6d3b9bee721e36306d1774188d0e8c9170a8
                • Instruction Fuzzy Hash: 87814F36204A85C6EB679B2BE9403AF6B61F38DBD0F594512EF9A477B5CE38C442D310
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: edcdc2154c5838ab1c8625022021c2da12bae5cdd39a93ebf1f5cb6a04e32108
                • Instruction ID: bfac23c94d9038130fb0cc9f6c7292f6f1aa2b418e68c536fc9a693e481bc66c
                • Opcode Fuzzy Hash: edcdc2154c5838ab1c8625022021c2da12bae5cdd39a93ebf1f5cb6a04e32108
                • Instruction Fuzzy Hash: 1E91B13270164096FB22EB22D4517EE23A0EB9C3C8F855426BB4E57AFADF34C944C351
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bede4ae264e8185b0f9f24becd31f8195eff363a0612df846459a6d3a9af60c0
                • Instruction ID: 348a5c641c523964159132b8cb670365254cd557f13034448bd6fc243d7f1d42
                • Opcode Fuzzy Hash: bede4ae264e8185b0f9f24becd31f8195eff363a0612df846459a6d3a9af60c0
                • Instruction Fuzzy Hash: AB81503271064095FB12EB76D8913EE63A5AB9D7C8F944621BF0D4BAEAEF34C605C350
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c5a72caf03c22970d4fef77dedbe1bee6898f8b085468b7394fac77d0cc2e7ab
                • Instruction ID: 4362bffb4ce140633d60009826b42a117c21897de7dbf4a94b418fc321f1d931
                • Opcode Fuzzy Hash: c5a72caf03c22970d4fef77dedbe1bee6898f8b085468b7394fac77d0cc2e7ab
                • Instruction Fuzzy Hash: 35812032714A809AFB12EB72D4513ED2365EB9C388F814425BB4E67AEBEF35C605C354
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: 2ea0aee7501054cc679b21b17b3ec8bdf9c6d9fd89a4ddb5a7d9a4c31d441e67
                • Instruction ID: a8b049447ef23dc7a2f3147d56ae0c312f8ac6a7955db6ed7517384e00930876
                • Opcode Fuzzy Hash: 2ea0aee7501054cc679b21b17b3ec8bdf9c6d9fd89a4ddb5a7d9a4c31d441e67
                • Instruction Fuzzy Hash: 0371893270264096FB66AB7294503EE6391EB9C7C8F054526BB1D47BEAEF39C905C360
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 53d7b3c9e63ec17fbb3decf34851c1318d937a82485f1e960baa699eab580419
                • Instruction ID: 4c1290556f20f3e20b66d81894b0d385f6ea8bc2319cc982c81cb2944955426d
                • Opcode Fuzzy Hash: 53d7b3c9e63ec17fbb3decf34851c1318d937a82485f1e960baa699eab580419
                • Instruction Fuzzy Hash: 6E61B031301A4041EA66E737A9517EF97929F9D7D0FA44621BF5E877FAEE38C9028700
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 17ec1b3edf0780c5c25e1336ba948ef3e7aec6e0b63b2610df3acb1851feab05
                • Instruction ID: 50d9e92313d7fbe24902196c924c1612cff9653e99501bbf2772a847790ebefc
                • Opcode Fuzzy Hash: 17ec1b3edf0780c5c25e1336ba948ef3e7aec6e0b63b2610df3acb1851feab05
                • Instruction Fuzzy Hash: 7D618D3271464496FB22EB72C0913EE23A5ABDC7C8F854422BF4D57AEAEE35C501C791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e611ef6babe13b88f779e8dc5a7611e7c7a64f37548e21c7e35d19833addd5d9
                • Instruction ID: f8f81a1e6eeb4aa67bd22a5a7a70358e1ddf5b3241a247c9d5674b6b5ab46101
                • Opcode Fuzzy Hash: e611ef6babe13b88f779e8dc5a7611e7c7a64f37548e21c7e35d19833addd5d9
                • Instruction Fuzzy Hash: 9061C43262465091FB21EB26E0517EE6360FBCD7C4F815122BB5D47AEAEF79C541CB10
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: 2d057d9775497d8ce77184132c21eb618076589cfab5adda7cc754a5fd0d3834
                • Instruction ID: f33abad4c1c8ba015261be05896130ca5dc3e7c07ce7e813c180037223ea8262
                • Opcode Fuzzy Hash: 2d057d9775497d8ce77184132c21eb618076589cfab5adda7cc754a5fd0d3834
                • Instruction Fuzzy Hash: 08718E32714A809AEB12EF76D4913EE7761F798388F844026FB4D47AAADF74C548CB10
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$ClosePointerRead
                • String ID:
                • API String ID: 2610616218-0
                • Opcode ID: d3a452de0128449f2e5039728471469ce51d7081f01deae87ca1d54060856238
                • Instruction ID: 125c4d10a522e701d1fb6d0f1aef761f583aa31ccbb75f1db25899523a723602
                • Opcode Fuzzy Hash: d3a452de0128449f2e5039728471469ce51d7081f01deae87ca1d54060856238
                • Instruction Fuzzy Hash: 0151633271468052FB22EBB6E4513EE6761EBD83C4F951122BB4D47AEADE38C544CB01
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 025899d978c00459a39b97666279dda4e96ed2cbcc4f77a24580eef4709ea6a8
                • Instruction ID: af2d80f9b144edbe9aa630ca6e788b257520dbedf888a3db325da96401233726
                • Opcode Fuzzy Hash: 025899d978c00459a39b97666279dda4e96ed2cbcc4f77a24580eef4709ea6a8
                • Instruction Fuzzy Hash: FA612832600B8085E755DF36A481BDD33A9F78DB88FA84138EF990B36ADF318055D768
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f431bbfb257fb34b4f249f0b6c1a5781a1840d33aa954166e75b638a15f3be8f
                • Instruction ID: 50cb9f747c07e87171e39f534f7bbd71060f83f950b2ada1a46c15cbddfc577a
                • Opcode Fuzzy Hash: f431bbfb257fb34b4f249f0b6c1a5781a1840d33aa954166e75b638a15f3be8f
                • Instruction Fuzzy Hash: A0511B32700A4096FB12EB76D4917EE2365AB9C7C8F954421BF0DA7AEADF34C605C350
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e1a38846fc5b12dd28166e38272f044d4b391af603d2f1471411a8db1635f5ab
                • Instruction ID: 9602d307e9de31d357e639a9611a18ab9b6f2b9e1d5f0c6a8a00986c6f50d329
                • Opcode Fuzzy Hash: e1a38846fc5b12dd28166e38272f044d4b391af603d2f1471411a8db1635f5ab
                • Instruction Fuzzy Hash: 7F51AD32200A40A2EA22EB22D9957FE63A5F7DC7D0F854626FB0D836B6DF34C556D710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: File$PointerRead
                • String ID:
                • API String ID: 3154509469-0
                • Opcode ID: d96108c4bde49195b51d10af4498cce92db92bc86361a98dabd69ade9e6efc75
                • Instruction ID: aca98edda921e0e11dbb2b437e66833b6d9475281c93859f86ded24665675a69
                • Opcode Fuzzy Hash: d96108c4bde49195b51d10af4498cce92db92bc86361a98dabd69ade9e6efc75
                • Instruction Fuzzy Hash: E5516E3271465095FB52EB76E4913EE6761EBD8388F850026BB4E479EADF38C948CB04
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1c1f30609a35c92b6828c9fb432082ebd1e5c5e84766b67bb61e5bcc9401a082
                • Instruction ID: 51a026cb75a50cc44213724d5bb8c382370875f63e51d6fdf42d7c4c4c07ed92
                • Opcode Fuzzy Hash: 1c1f30609a35c92b6828c9fb432082ebd1e5c5e84766b67bb61e5bcc9401a082
                • Instruction Fuzzy Hash: 5D415F32B1066095FB12E77798517EE23A2ABCD7C4FA94421BF0E57AEBDE34C5018354
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8619ee3f9ccd1f320a5fbfbf5c9367aa5b7df2049cee1b1ea35a7e4b7e812f95
                • Instruction ID: fec891e6c53086f7b9094a78f95b73510c7007b912bc3ef8a41aa8e11e9acb14
                • Opcode Fuzzy Hash: 8619ee3f9ccd1f320a5fbfbf5c9367aa5b7df2049cee1b1ea35a7e4b7e812f95
                • Instruction Fuzzy Hash: 01413D31B2066095FB12EB7798513EE13A6ABDC7C4F994421BF0E97AEADE38C5058314
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a10d479a193238a188e8adb5c0a2baa624421bbad2986b298b06f84ca2b66ec
                • Instruction ID: 4d6ce7f696a26fe9a74b6bb9734e6d6bbac3d85ccec2ef1c97bdec5ab73240ea
                • Opcode Fuzzy Hash: 9a10d479a193238a188e8adb5c0a2baa624421bbad2986b298b06f84ca2b66ec
                • Instruction Fuzzy Hash: FC51D732610B9085E785DF36E4813DD33A9F748F88F58413AAB8D4B7AADF348152C764
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID: CreateMutex
                • String ID:
                • API String ID: 1964310414-0
                • Opcode ID: 0dd31b007056381f4657a5f1dbdce23ecbf955912ad383fd51e82bbfc18d9e36
                • Instruction ID: a9185cf0004c76bb3001b2cb896eaa84c5f9aff40342764b4326ba4d96cea24c
                • Opcode Fuzzy Hash: 0dd31b007056381f4657a5f1dbdce23ecbf955912ad383fd51e82bbfc18d9e36
                • Instruction Fuzzy Hash: 9F514632310B81A2E74EDB32E5813D9B369FB8C384F908415EB9813AA6DF35D676D704
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d0bc628afaa724f2a407568f7776cab89400c990b0d91b82c0bf42df1747497
                • Instruction ID: 1e1e8128ca37617077ad8d3bddb138d765a5f71e348f586f351b06e9a9582713
                • Opcode Fuzzy Hash: 8d0bc628afaa724f2a407568f7776cab89400c990b0d91b82c0bf42df1747497
                • Instruction Fuzzy Hash: 5C51C773611B9085E745DF36E8813DD37A8F748F88F58413AEB894B6AADF308156C760
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a990b53e0665ad0886faa979631976ec8b00dc7985899795eb44eacb3e5b3434
                • Instruction ID: 5f416d68214368cc8d497caad67b5ad9eebcd67f96a0df70edf52f54e079c757
                • Opcode Fuzzy Hash: a990b53e0665ad0886faa979631976ec8b00dc7985899795eb44eacb3e5b3434
                • Instruction Fuzzy Hash: DE31F53221099842FBA6471B9C613F93292E79C3E4F649625FB8E537F4D67DC8038B80
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5bce42950a1e8a62078921d64ca997753bf7c09f413ca20ce6f360246a445e94
                • Instruction ID: 604a730c127844f2816d2636316060c5dd02da03d6f4240a24423d76594c64fe
                • Opcode Fuzzy Hash: 5bce42950a1e8a62078921d64ca997753bf7c09f413ca20ce6f360246a445e94
                • Instruction Fuzzy Hash: 55313F32610B9091E749DB36D9813DD73A9F78CB84FA58526A39847AA6DF35C177C300
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.272674434.0000000140001000.00000020.00020000.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.272662140.0000000140000000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272915344.0000000140080000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.272957565.0000000140092000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.272984489.0000000140094000.00000002.00020000.sdmp Download File
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cc6e0ee29a39c7d5a8b9bac5d98e7e3adc62a080d0eb157144b98198d9367420
                • Instruction ID: 1d8fa33d8030516f9812c7435f1c2f5fee2e6c5a40d503ba1f82db291cb841dc
                • Opcode Fuzzy Hash: cc6e0ee29a39c7d5a8b9bac5d98e7e3adc62a080d0eb157144b98198d9367420
                • Instruction Fuzzy Hash: 7131DC32600B4080E745DF3699813EDB3E9FBACB88FA9853697484A9B6DF35C157D310
                Uniqueness

                Uniqueness Score: -1.00%

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.330724737.00000269BFAF0000.00000040.00000001.sdmp, Offset: 00000269BFAF0000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: 81ad72f61a8f1785659760e2cd5ed55239497d4a215c509f336ea74ac629d654
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: 79B14376618BC486D730CB1AF44079EB7A5F7C9B94F108126EE8997F58DB7AC8818F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,00000269BFAF29A8), ref: 00000269BFAF20A7
                Memory Dump Source
                • Source File: 00000002.00000002.330724737.00000269BFAF0000.00000040.00000001.sdmp, Offset: 00000269BFAF0000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: 55b89304cb8380d4327c9847b2898d51d71b7fe92a465606b0ebd9fbdd4c0ea3
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: F0312B76615B9086D790DF1AF49475A7BA4F389BD8F205026EF8D87B18DF3AC486CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.252797299.000002953F090000.00000040.00000001.sdmp, Offset: 000002953F090000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: 5bd4ff0fe5610fb26965c35287eb49f27d33a6f2ff0d2634de3894410ea44094
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: CCB14476618BD486EB70CB1AE44079EB7A1F7C9BC0F108126EEC957B68DB79C8518F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,000002953F0929A8), ref: 000002953F0920A7
                Memory Dump Source
                • Source File: 00000003.00000002.252797299.000002953F090000.00000040.00000001.sdmp, Offset: 000002953F090000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: 0cc1bc70fdd351fe9ccfafcce949a656990f4ee52a66898e6232e5d13363fce1
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: B9315C76715B9086D780DF1AE45475A7BA0F389BC4F204026EF8E87B68DF3AC442CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.259242087.0000019C263F0000.00000040.00000001.sdmp, Offset: 0000019C263F0000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: 5653d6d5166a4d12949be68acc0e1a4cfd2106efbb71a420bafea3bfb94fb671
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: 66B144B6618BC586D730CB5AE4507DAB7A1F7C9B80F108126EEC957B58CB79C8518F80
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0000019C263F29A8), ref: 0000019C263F20A7
                Memory Dump Source
                • Source File: 00000006.00000002.259242087.0000019C263F0000.00000040.00000001.sdmp, Offset: 0000019C263F0000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: 6243f3b7fd7afd0401f53d9e01d89cc31c7c0d9388771bc131afa0026cfd34ab
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: EB315C72615B8486D780DF1AF45479A7BA0F389BC4F204026EF8D87B18DF3AC442CB40
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000008.00000002.266704018.0000017BF3F80000.00000040.00000001.sdmp, Offset: 0000017BF3F80000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: b56a3770fffae196affb988787fbedf8de034f8f36621f2042fb90eeb853037c
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: E8B13576619BC486DB70CB1AE4807DEB7A1F7C9B80F108126EE8D97B58DB79C8518F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0000017BF3F829A8), ref: 0000017BF3F820A7
                Memory Dump Source
                • Source File: 00000008.00000002.266704018.0000017BF3F80000.00000040.00000001.sdmp, Offset: 0000017BF3F80000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: 00c2bda60398d3a80dbcc495d1f9bbedb718879e8282ba104b78ee9c0403d6d2
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: 89314D72619B9086D790DF1AE49479A7BB0F389BC4F204126EF8D87B18DF3AC442CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.367054606.000001E070470000.00000040.00000001.sdmp, Offset: 000001E070470000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: ff9812530533337825481c6cb1dd74350b89dcdee6710df5a6cc4ab4a6a1e770
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: BCB134B6618BC486D770CB1AE4407DEB7A1F7C9B80F108126EEC957B58DB79C8918F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,000001E0704729A8), ref: 000001E0704720A7
                Memory Dump Source
                • Source File: 00000013.00000002.367054606.000001E070470000.00000040.00000001.sdmp, Offset: 000001E070470000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: 65196e20112d6df2912c0d0103c1e64863d7901217b7c1e29590f5a66b29e577
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: 52315EB6615B8086D790DF1AE45479A7BB0F389BC4F205126EF8D87B28DF39C482CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Init$Message$PrivProcessThread$#100.#101.CreateDispatchInitializeInstanceTranslateUninitialize
                • String ID:
                • API String ID: 4254097162-0
                • Opcode ID: 61929680886df08c68e9dff58d09feec4ad21e96bc592253da7c0fda91e0035e
                • Instruction ID: d5276a9e833f7142f9758dac5e6e2184634933da6991d2c6e5718bac5ad94928
                • Opcode Fuzzy Hash: 61929680886df08c68e9dff58d09feec4ad21e96bc592253da7c0fda91e0035e
                • Instruction Fuzzy Hash: 3F610936B08A87C6EF048F66D8947692764FF54B88F044539DA0D877E5EF2EE845C341
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                • String ID:
                • API String ID: 4104442557-0
                • Opcode ID: 7d122c814e35747db201a093c82d5b9628a932b7616b14537c921e9fb50be613
                • Instruction ID: de75d57adf0d70122dd6b3554282b73e66a88703bc8c9a857f4d4f06c3f6157e
                • Opcode Fuzzy Hash: 7d122c814e35747db201a093c82d5b9628a932b7616b14537c921e9fb50be613
                • Instruction Fuzzy Hash: 69111F32648B82CAEF00DF71E8451A833B4FB09758B401A39EA6D83795EF3DD9A4C340
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Binding$BindCall3ClientCreateFree
                • String ID:
                • API String ID: 3153544568-0
                • Opcode ID: 32ddcc0b2a88582b0bca62dc42aeaeb43cb26be5f8e5cceb9c301674fa341c94
                • Instruction ID: 1a22bc57e6bb3641a3a8f18cf5f73e57658edfb3a71c8657c0f1aff19d8614bf
                • Opcode Fuzzy Hash: 32ddcc0b2a88582b0bca62dc42aeaeb43cb26be5f8e5cceb9c301674fa341c94
                • Instruction Fuzzy Hash: DF412C72A18B82C6E750CF15E48936E73E4FB48780F51423EE69D86A95DF3ED845CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF686902ABF
                • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF686902AC8
                • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF686902ACE
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ExceptionFilterUnhandled$CurrentProcess
                • String ID:
                • API String ID: 1249254920-0
                • Opcode ID: 97d8a8dd346e75d143d7190649157eb57f55e9ca3c9d6070c440713ce96147f7
                • Instruction ID: 9f94efecda750d5be90d0fe1dbb4a75da3793cdaf1e207f4fb15d75e81c17011
                • Opcode Fuzzy Hash: 97d8a8dd346e75d143d7190649157eb57f55e9ca3c9d6070c440713ce96147f7
                • Instruction Fuzzy Hash: C4D09E61A48587C6EF195B6269155351224BF5DB41B045038CA0B85392DE3E5885C201
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: BindingFree
                • String ID:
                • API String ID: 3284907940-0
                • Opcode ID: b708ccadb7c375c46b3f5c8084dbe4685f1281568ece7b0df26b6d57c1559fb8
                • Instruction ID: dc6003601ceee642acab542b364e34dc620afc196e5f1dbd8699a7f286c6b1a1
                • Opcode Fuzzy Hash: b708ccadb7c375c46b3f5c8084dbe4685f1281568ece7b0df26b6d57c1559fb8
                • Instruction Fuzzy Hash: 0EE030316186C2C5EBA4CB2590553B96294FF8C750F90003EEA8FC3695DF2DDC45CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF68690278B
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: e6df00906e8a6524f14c2b33c500a4a1d15c29b5394f90cd34e2498dbd255c79
                • Instruction ID: 4eca368cd02c067c872c00b4bf5037c810a44208bf482c0282734e43ef21962e
                • Opcode Fuzzy Hash: e6df00906e8a6524f14c2b33c500a4a1d15c29b5394f90cd34e2498dbd255c79
                • Instruction Fuzzy Hash: 69B01220F25483C1DE08EB21DC8A06812A4BF5C300FC00434C20DC11B1DF5DA99BC701
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Direct$Value@$Element@$Parser@V12@$CreateInfo@2@$ClassDescendent@FindPropertyRelease@Value@2@@Zero$Bool@Create@Destroy@E__@@1@E__@@@Element@2@1FromHandleInfoModulePtr@Resource@RichString@Text@V12@_V32@@Value@2@
                • String ID: DmDialogContentId$OmaCpDialogTop$UserPinInput
                • API String ID: 1868330729-2178697751
                • Opcode ID: bee45f6068e268a859d6ad1d91cf1b11bd8c04c07142fb6c82627a25f614043d
                • Instruction ID: a92f6dc1805bbe9eeb7c72b18b4cfa78fe26a0858820b1c6854b229e8cf31bf5
                • Opcode Fuzzy Hash: bee45f6068e268a859d6ad1d91cf1b11bd8c04c07142fb6c82627a25f614043d
                • Instruction Fuzzy Hash: 5F510D25B08B83C2EF158B96E89476923A5BF48B94F444139CE4D87792EF3EE845D342
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CopyFreeLocalString$CloseCreateErrorHandleLastObjectSingleThreadWait
                • String ID:
                • API String ID: 2855853873-0
                • Opcode ID: 9bffc6490ad60a8e95742af8393673189a85ce4b3c7cb846c6a27f1590e2a92c
                • Instruction ID: d20879607062be90ec3b581d0fec9226fdfaf4cbe258969c898d3fe674d24092
                • Opcode Fuzzy Hash: 9bffc6490ad60a8e95742af8393673189a85ce4b3c7cb846c6a27f1590e2a92c
                • Instruction Fuzzy Hash: B2611F36B08B83CAEB10CBA594443AD23A5BF49B98F504239CE5E967D5DF3ED849C341
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CommandFreeLineLocal$ArgvErrorInitializeLastUninitialize_wcsicmp
                • String ID:
                • API String ID: 3313995102-0
                • Opcode ID: a4c85135d671fea3ae6d4f254c5a6124869045b39bf224a83f98fe3dab449bab
                • Instruction ID: 7dada3ca84ff94aa907cca17680d57c23914c0e0ede55a909bfa7fae5f82cf5e
                • Opcode Fuzzy Hash: a4c85135d671fea3ae6d4f254c5a6124869045b39bf224a83f98fe3dab449bab
                • Instruction Fuzzy Hash: 10413922A08782C6EB54DB52E84456977B4FF89F80B544039DB4E83796EF3EDC45C705
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_cexit_inittermexit
                • String ID:
                • API String ID: 642454821-0
                • Opcode ID: 25f97fcd6910eef572602e3a6738eef6fa6d2c649038de40a7fc4a343e22c2b6
                • Instruction ID: 5c332334c2edfae5a5a9614b4c45085601c6eddd129b6d70eef529db81d82449
                • Opcode Fuzzy Hash: 25f97fcd6910eef572602e3a6738eef6fa6d2c649038de40a7fc4a343e22c2b6
                • Instruction Fuzzy Hash: BC612436A0D683C2EF608B14A85167932A4FF98784F44513AD94DD72E6DF3EEC91C742
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • StrToID.DUI70 ref: 00007FF6869014B8
                • ?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z.DUI70 ref: 00007FF6869014C5
                  • Part of subcall function 00007FF686901E24: ?GetClassInfoPtr@TouchEdit2@DirectUI@@SAPEAUIClassInfo@2@XZ.DUI70(?,?,00000000,00007FF6869014D3), ref: 00007FF686901E50
                • ?GetEncodedContentString@Element@DirectUI@@QEAAJPEAG_K@Z.DUI70 ref: 00007FF6869014E1
                • CopyString.DMCMNUTILS ref: 00007FF686901501
                Strings
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Direct$ClassElement@$ContentCopyDescendent@Edit2@EncodedFindInfoInfo@2@Ptr@StringString@TouchV12@
                • String ID: UserPinInput
                • API String ID: 3516318120-4151018994
                • Opcode ID: 62b74577ff1e9fa48ac2c0b14cc736ee405bf5aaaaa97587499ac088e2ae0a29
                • Instruction ID: 41dbf06adf5100186730d5676b383b1f45c3dd5c6dc8eafda096a47474ae9a77
                • Opcode Fuzzy Hash: 62b74577ff1e9fa48ac2c0b14cc736ee405bf5aaaaa97587499ac088e2ae0a29
                • Instruction Fuzzy Hash: 77219236A186C3C2EF61CB55E4442796361FF84B85F500139DA8E876EAEF3ED944C701
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.368352067.00007FF686901000.00000020.00020000.sdmp, Offset: 00007FF686900000, based on PE: true
                • Associated: 00000013.00000002.368343010.00007FF686900000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368362956.00007FF686905000.00000002.00020000.sdmp Download File
                • Associated: 00000013.00000002.368373050.00007FF686909000.00000004.00020000.sdmp Download File
                • Associated: 00000013.00000002.368381314.00007FF68690A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: FreeLocal
                • String ID:
                • API String ID: 2826327444-0
                • Opcode ID: dd6135ccec83fcfd95efa3c4702c3f4b8f5912c7849e5d2e1a0fc5cf580dbd8e
                • Instruction ID: 365785a1a37fc626ec9749e76a3c2b5e3f49964b55a643707a4563b4617f39b1
                • Opcode Fuzzy Hash: dd6135ccec83fcfd95efa3c4702c3f4b8f5912c7849e5d2e1a0fc5cf580dbd8e
                • Instruction Fuzzy Hash: B301E832618A82C5DF10CF26D8646292334FF8AF66F101635C96E8B2F5CF2DD889C345
                Uniqueness

                Uniqueness Score: -1.00%

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.395757086.000002846DAB0000.00000040.00000001.sdmp, Offset: 000002846DAB0000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$NodeRemove
                • String ID:
                • API String ID: 3879549435-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: df1a4e16e231b3adb60514225be20639203a2cc18c85b59baec3680b8537f86c
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: E6B14476619BD58AD730CF1AE44079AB7A0F7C9B84F108126EEC957B58DB7EC8428F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,000002846DAB29A8), ref: 000002846DAB20A7
                Memory Dump Source
                • Source File: 00000019.00000002.395757086.000002846DAB0000.00000040.00000001.sdmp, Offset: 000002846DAB0000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: f2fd25b7e682677a1e13e4945e183f68085039528c837420aff066e1acb3d077
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: D8315A76615B9086D780DF1AE49475A7BB4F789BC4F208026EF8D87B28DF3AC442CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                APIs
                • memset.MSVCRT ref: 00007FF644D52BE6
                • GetCurrentProcessId.KERNEL32 ref: 00007FF644D52C03
                • ProcessIdToSessionId.KERNEL32 ref: 00007FF644D52C0E
                • GetLastError.KERNEL32 ref: 00007FF644D52C18
                • CreateEventW.KERNEL32 ref: 00007FF644D52D12
                • GetLastError.KERNEL32 ref: 00007FF644D52D24
                • RegOpenKeyExW.ADVAPI32 ref: 00007FF644D52DA1
                • Sleep.KERNEL32 ref: 00007FF644D52DBC
                • RegNotifyChangeKeyValue.ADVAPI32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D52DDF
                • RegGetValueW.ADVAPI32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D52E1B
                • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D52E3B
                • MapViewOfFile.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D52ECA
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D52F66
                • SysAllocStringByteLen.OLEAUT32 ref: 00007FF644D53121
                • SetEvent.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D531C6
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D52EDC
                  • Part of subcall function 00007FF644D521A8: GetModuleHandleExA.KERNEL32 ref: 00007FF644D521DC
                  • Part of subcall function 00007FF644D521A8: GetProcAddress.KERNEL32 ref: 00007FF644D521F2
                  • Part of subcall function 00007FF644D521A8: FreeLibrary.KERNEL32 ref: 00007FF644D52212
                  • Part of subcall function 00007FF644D51054: TraceMessage.ADVAPI32 ref: 00007FF644D5108B
                • SetEvent.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D5327E
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D5328F
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532A7
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532B5
                • UnmapViewOfFile.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532C3
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532D2
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Handle$CloseErrorLast$Event$FileProcessValueView$AddressAllocByteChangeCreateCurrentFreeLibraryMessageModuleNotifyObjectOpenProcSessionSingleSleepStringTraceUnmapWaitmemset
                • String ID: %8.8x$CoCreateInSession failed!$P$Software\Microsoft\Terminal Services\SessionAgent\Handles$m_InvitationManager.Initialize failed!
                • API String ID: 2383806214-1043453657
                • Opcode ID: 295d62d70f6ee63c46462a880d84121fedb38e6225a64f0498a69a0fffb368d1
                • Instruction ID: 81d8b4d1c770d276b398a7be57c71f79fecb89131a61b350dff6e748bb555c45
                • Opcode Fuzzy Hash: 295d62d70f6ee63c46462a880d84121fedb38e6225a64f0498a69a0fffb368d1
                • Instruction Fuzzy Hash: FE226721B0CA4A86FB54BB59E4C637966A1EF85B48F800736CD4DC3699EF3CE549C780
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • memset.MSVCRT ref: 00007FF644D522E8
                • RegisterTraceGuidsW.ADVAPI32 ref: 00007FF644D5236C
                • EtwEventUnregister.NTDLL ref: 00007FF644D52386
                • EtwEventRegister.NTDLL ref: 00007FF644D523B5
                • HeapSetInformation.KERNEL32 ref: 00007FF644D52449
                • GetLastError.KERNEL32 ref: 00007FF644D52478
                • GetCurrentProcess.KERNEL32 ref: 00007FF644D524A7
                • OpenProcessToken.ADVAPI32 ref: 00007FF644D524BC
                • GetLastError.KERNEL32 ref: 00007FF644D524C6
                • CloseHandle.KERNEL32 ref: 00007FF644D5279D
                  • Part of subcall function 00007FF644D565E0: GetTokenInformation.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56636
                  • Part of subcall function 00007FF644D565E0: GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D5663C
                  • Part of subcall function 00007FF644D565E0: GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56647
                  • Part of subcall function 00007FF644D565E0: LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D569FA
                  • Part of subcall function 00007FF644D565E0: LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56A03
                  • Part of subcall function 00007FF644D565E0: LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56A0C
                • CoInitializeEx.OLE32 ref: 00007FF644D525BC
                • CoInitializeSecurity.OLE32 ref: 00007FF644D5263A
                • CloseHandle.KERNEL32 ref: 00007FF644D5268D
                  • Part of subcall function 00007FF644D52BA0: memset.MSVCRT ref: 00007FF644D52BE6
                  • Part of subcall function 00007FF644D52BA0: GetCurrentProcessId.KERNEL32 ref: 00007FF644D52C03
                  • Part of subcall function 00007FF644D52BA0: ProcessIdToSessionId.KERNEL32 ref: 00007FF644D52C0E
                  • Part of subcall function 00007FF644D52BA0: GetLastError.KERNEL32 ref: 00007FF644D52C18
                  • Part of subcall function 00007FF644D52BA0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D5328F
                  • Part of subcall function 00007FF644D52BA0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532A7
                  • Part of subcall function 00007FF644D52BA0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532B5
                  • Part of subcall function 00007FF644D52BA0: UnmapViewOfFile.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532C3
                  • Part of subcall function 00007FF644D52BA0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000001,?,00000001,00000000,00000000,00000000,00000002,00007FF644D5271B), ref: 00007FF644D532D2
                • GetMessageW.USER32 ref: 00007FF644D52779
                • CoUninitialize.OLE32 ref: 00007FF644D527C8
                • UnregisterTraceGuids.ADVAPI32 ref: 00007FF644D527E5
                  • Part of subcall function 00007FF644D521A8: GetModuleHandleExA.KERNEL32 ref: 00007FF644D521DC
                  • Part of subcall function 00007FF644D521A8: GetProcAddress.KERNEL32 ref: 00007FF644D521F2
                  • Part of subcall function 00007FF644D521A8: FreeLibrary.KERNEL32 ref: 00007FF644D52212
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Handle$Close$ErrorLast$FreeProcess$Local$CurrentEventGuidsInformationInitializeRegisterTokenTraceUnregistermemset$AddressFileHeapLibraryMessageModuleOpenProcSecuritySessionUninitializeUnmapView
                • String ID: CoInitializeEx failed!$CoInitializeSecurity failed!$pSessionAgent->Initialize failed!$s_RestrictProcessDacl failed!
                • API String ID: 3768998025-906985116
                • Opcode ID: a28acd67663b20985fa5a912ff4009cefa2fc6bc98dfc599ac2a97093b528268
                • Instruction ID: aae2a859c107494bbdf230d9ae8453ea007cedfbcb3bdfd26baec6fcf4153ab0
                • Opcode Fuzzy Hash: a28acd67663b20985fa5a912ff4009cefa2fc6bc98dfc599ac2a97093b528268
                • Instruction Fuzzy Hash: F8F14425A0CA4A85EB10FF25E8D62B967A1FF45B48F480635DD4DC76A8EF3CE419CB40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$AddressBindCreateFromHandleLibraryModuleProcStringTaskmemset
                • String ID: CreateBindCtx$MkParseDisplayName$Session:%d!clsid:%s$StringCchPrintf$StringFromCLSID$pClassFactory->CreateInstance$pMoniker->BindToObject
                • API String ID: 877699110-3611846579
                • Opcode ID: 0af359a63ef3c3987f174756f0959ca658356c5535a570ae88e56a3df0b180a8
                • Instruction ID: 8a56305ff60814316cbad9e3888a6b1a74419f03bf6ebae6548e3a470cd28e78
                • Opcode Fuzzy Hash: 0af359a63ef3c3987f174756f0959ca658356c5535a570ae88e56a3df0b180a8
                • Instruction Fuzzy Hash: 2AA11621A1CA4A81FB54BB55E8C636927A1FF85B88F840A36DE4DC37A8DF3CE544C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ErrorLast$FreeLoadMessageString$AddressFormatHandleLibraryLocalModuleProcSendStation
                • String ID:
                • API String ID: 1622843928-0
                • Opcode ID: 45ac4d55777a6273ee0c8f6dbf643fc8751ccc4fe972e4fec0c11b78bd279a46
                • Instruction ID: c40699ef9e6b26510734739071ba1eaa607913c6b688fb0ac6df8b9a1f9564d5
                • Opcode Fuzzy Hash: 45ac4d55777a6273ee0c8f6dbf643fc8751ccc4fe972e4fec0c11b78bd279a46
                • Instruction Fuzzy Hash: 5061BB72A0C6668AFB50FB24E4C63A927A1FF81758F440635EE4D83698EF3CE485C701
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ErrorLastNameUser$AddressFreeHandleLibraryMessageModuleProcTracemalloc
                • String ID:
                • API String ID: 45522011-0
                • Opcode ID: d2d2279a0b43e686b4a571e6d6d2fc6f4ce899701ebcdda7c37082f19d3f331f
                • Instruction ID: 113c9e0abb74b45806dad5a91dad59e22b78a67aa90fec32d5093c99f5ddadea
                • Opcode Fuzzy Hash: d2d2279a0b43e686b4a571e6d6d2fc6f4ce899701ebcdda7c37082f19d3f331f
                • Instruction Fuzzy Hash: 96417C31A0C69682EB44BB55D8C63B963A0FF84B88F444636DE4DC7299EF3CE849C341
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: FreeHeap$ProcessString
                • String ID:
                • API String ID: 457288585-0
                • Opcode ID: 559c64792ac9560919e75cee1c4c8ab7317a46151fce02296da576f183cc869b
                • Instruction ID: 3cb4dcf34a526c48c90e88def139272111ac8630b7fd4a31262d969e92a5dc06
                • Opcode Fuzzy Hash: 559c64792ac9560919e75cee1c4c8ab7317a46151fce02296da576f183cc869b
                • Instruction Fuzzy Hash: 2D112A26E19B4592EB14BF66D48636D63A0FB48F88F188631DE1D83729CF38D461C350
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetTokenInformation.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56636
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D5663C
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56647
                • LocalAlloc.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D566BE
                • GetTokenInformation.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56738
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56742
                • GetSecurityInfo.ADVAPI32 ref: 00007FF644D567AE
                • GetLengthSid.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56805
                • LocalAlloc.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56814
                • InitializeAcl.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56866
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56870
                • AddAccessDeniedAce.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D568C3
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D568CD
                • GetAce.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56923
                • AddAce.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D5694A
                • SetSecurityInfo.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56983
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D5698D
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D567B8
                  • Part of subcall function 00007FF644D521A8: GetModuleHandleExA.KERNEL32 ref: 00007FF644D521DC
                  • Part of subcall function 00007FF644D521A8: GetProcAddress.KERNEL32 ref: 00007FF644D521F2
                  • Part of subcall function 00007FF644D521A8: FreeLibrary.KERNEL32 ref: 00007FF644D52212
                  • Part of subcall function 00007FF644D51054: TraceMessage.ADVAPI32 ref: 00007FF644D5108B
                • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D569FA
                • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56A03
                • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56A0C
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56A2D
                • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000002,00007FF644D5254D), ref: 00007FF644D56A6F
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ErrorLast$Local$Free$AllocInfoInformationSecurityToken$AccessAddressDeniedHandleInitializeLengthLibraryMessageModuleProcTrace
                • String ID:
                • API String ID: 1899397276-0
                • Opcode ID: e7a90bed76ce9284efcc66573fe9e898120c244803f6f07a9ac087e3c455ddf1
                • Instruction ID: e599039d3ce63feff3c69ae6337f27c6cd26310fddd8cec0c55f6b956849f49b
                • Opcode Fuzzy Hash: e7a90bed76ce9284efcc66573fe9e898120c244803f6f07a9ac087e3c455ddf1
                • Instruction Fuzzy Hash: 82D16921A0CA4685FB54BB25D8C637922A1FF85B88F504639DE4DC36ADEF3CE586C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: String$Free$Alloc$AddressCreateHandleInstanceLibraryModuleProc_vsnwprintfmemset
                • String ID: CreateInvitation failed!$CreateSharer failed!$RdpSharingGroup%lu$RequestPermission failed!$StringCchPrintf failed!$W$get_ConnectionString failed!$get_Invitations failed!$m_InvitationManager.AddInvitation failed!
                • API String ID: 2994106472-260615923
                • Opcode ID: d72c99a3c96e5da6ebc02d385e43753ecbaf6f3fa4b92a53ddf3e31d4ff06f6e
                • Instruction ID: 4b03835bfe9c1f35ee2deb096a1cfa8605d39a435d7aa5f10d1294b9fc8f07d6
                • Opcode Fuzzy Hash: d72c99a3c96e5da6ebc02d385e43753ecbaf6f3fa4b92a53ddf3e31d4ff06f6e
                • Instruction Fuzzy Hash: AAF17921B0CA5A85EB55FB29D4C777926A1EF85788F900236DE0DC36A9EF3CE445C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ErrorHeapLast$AddressAllocClassCreateFreeHandleLibraryMessageModuleProcProcessRegisterTraceWindow
                • String ID: P$RdpSaInvitationManagerHiddenWindowClass
                • API String ID: 1051298514-1869267889
                • Opcode ID: 32924e0dbbf31b92cfd290863c2f3be03c8ef1a368cc44fbde0c5f9e7a7fb90f
                • Instruction ID: 473417a39d574bd6b18a7466aabfb8a63a25bdb47c6efd002d9a393b7e83c62d
                • Opcode Fuzzy Hash: 32924e0dbbf31b92cfd290863c2f3be03c8ef1a368cc44fbde0c5f9e7a7fb90f
                • Instruction Fuzzy Hash: 2D514C31A0CB8686EB10BB15E49636973A1FB88789F544635DE9DC3AA8EF3CE445C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$AddressHandleLibraryMessageModuleProcStringTracememset
                • String ID: CheckAttendees failed!$OnAttendeeDisconnected failed$QueryInterface failed$get_Attendee failed$get_Invitation failed
                • API String ID: 2282493781-3224994625
                • Opcode ID: 49d166cbbf6708dbe97edbfffc5eced51344001c15bb1d8fad7801292b8d6508
                • Instruction ID: feb2c6daedd84daf56a76c3482ed4fec8d206373a2549f20d88e664b9b459121
                • Opcode Fuzzy Hash: 49d166cbbf6708dbe97edbfffc5eced51344001c15bb1d8fad7801292b8d6508
                • Instruction Fuzzy Hash: A6C15A22A1CA4A81EB55FB19E4D237927A1FB84788F504236DE8DC36ADEF3CE545C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AllocHeapString$ErrorFreeLastProcessTimer
                • String ID: FindEmptySlot failed!
                • API String ID: 1042745649-2129246577
                • Opcode ID: b5f20a41a136d78737ab60bf920bdc3a6d1c2ea70cdf41eebc6177dd218f6bc8
                • Instruction ID: b494404a0d0e5e50be529fa3dfe8cc77aa5ebe0c6218f6a0f2135d51113c9f5d
                • Opcode Fuzzy Hash: b5f20a41a136d78737ab60bf920bdc3a6d1c2ea70cdf41eebc6177dd218f6bc8
                • Instruction Fuzzy Hash: E4819E26B0CB4A92EB14FB19E4C636927A0FB88B89F044636CE5D87768DF3CE455C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: FreeString$AddressHandleLibraryMessageModuleProcTrace
                • String ID: get_ConnectionString failed
                • API String ID: 970986136-1709225964
                • Opcode ID: a328b21a5c1bb5f4aacab9363ea2a6017775d17a987e5960f69a93f7db73e323
                • Instruction ID: 529fbfc7d46f5cfe272bb5e563820d140e410e906972dd42a9b775061d2ae96c
                • Opcode Fuzzy Hash: a328b21a5c1bb5f4aacab9363ea2a6017775d17a987e5960f69a93f7db73e323
                • Instruction Fuzzy Hash: 5D615C21A0CA4A81FB10BB59D8C677A67A1FF84788F440231DE4DC36A9EF3CE449C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$AddressHandleLibraryMessageModuleProcStringTracememset
                • String ID: OnAttendeeConnected failed$QueryInterface failed$get_Invitation failed$put_ControlLevel failed
                • API String ID: 2282493781-4293350382
                • Opcode ID: 1ff518e1354e011f75b997946db2fe16f7964cc72ee8c63bba9072ed87ba3141
                • Instruction ID: 737972c40994ddbb072c47316fc8b42de32ed682ce72d6c5707f2015ca66cd83
                • Opcode Fuzzy Hash: 1ff518e1354e011f75b997946db2fe16f7964cc72ee8c63bba9072ed87ba3141
                • Instruction Fuzzy Hash: 71B14B22A0CA4A81EB55FB19E4D237967A1FB84B49F904236DE4DC36ADEF3CE445C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_cexit_inittermexit
                • String ID:
                • API String ID: 642454821-0
                • Opcode ID: 92c6d76466b1d58ed48551b123026d4d83d552ec42d2a46460bb1e4ae8317fce
                • Instruction ID: 79866c36cbb264ba5d19a6b227f25b2ad5baeb62d9e06f297e98e5e4ec445c42
                • Opcode Fuzzy Hash: 92c6d76466b1d58ed48551b123026d4d83d552ec42d2a46460bb1e4ae8317fce
                • Instruction Fuzzy Hash: E6612321F0DA4282EB60BB15E8C267926E1FF44780F640636EE4DD76A8DF3CE891C704
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                • String ID:
                • API String ID: 4104442557-0
                • Opcode ID: 4df213cc1c05fb5605c22fb6576b96e5c5ce2c3fa1859ae02645a6a4f8569fa6
                • Instruction ID: bb633011dd434abe17f049e7858385d6088207530c5c2ea6802d179ddc29da29
                • Opcode Fuzzy Hash: 4df213cc1c05fb5605c22fb6576b96e5c5ce2c3fa1859ae02645a6a4f8569fa6
                • Instruction Fuzzy Hash: EB11FC21A09F418ADB10EF65E88A16833A4FB09798B401E35EE6D82758EF38D564C240
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$AddressHandleLibraryMessageModuleProcStringTracememset
                • String ID: GetAttendeeName failed$QueryInterface failed$get_Invitation failed
                • API String ID: 2282493781-2806388699
                • Opcode ID: 19eacb7f806eb83fdd85cd07114d25ceb17446bf31599b4cc3ef4f17efe19cbe
                • Instruction ID: d9dbc9269a0f63dfcbd7f6a5eb6830eceaa71e3aef12c9672db83feb3af48792
                • Opcode Fuzzy Hash: 19eacb7f806eb83fdd85cd07114d25ceb17446bf31599b4cc3ef4f17efe19cbe
                • Instruction Fuzzy Hash: 50A13A22A0CA4A81EB14FB19E4C637967A1FF85748F944236DE4DC36A9EF3CE446C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$String$AddressErrorHandleKillLastLibraryMessageModuleProcTimerTrace
                • String ID: Invitation could not be revoked$No matching invitation found
                • API String ID: 1818234893-3520447018
                • Opcode ID: f23d64450a7c91306cadd978024e9e1de71a88a676eea852ccdc501fde00ceb8
                • Instruction ID: fb8de5fe374759acb7c7b6ff39d35e1644ce6478c6ad9b6865e69093262a9a1e
                • Opcode Fuzzy Hash: f23d64450a7c91306cadd978024e9e1de71a88a676eea852ccdc501fde00ceb8
                • Instruction Fuzzy Hash: 83714921A0CA4A81EB21FB19D4C637967A1EF89B49F500636DE4DC36A9EF3DE446C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$AddressHandleLibraryMessageModuleProcStringTrace
                • String ID: QueryInterface failed$StringCchCopyW failed$get_ConnectivityInfo failed$get_PeerIP failed
                • API String ID: 1365254058-2298798476
                • Opcode ID: 838871a958581ee41face61bd42299d32fa4a16dc4b832c476728f2296bf009b
                • Instruction ID: 0ec7ad89d9c3c5549ca6c763c31db8fdcb6eaff8eaa0f96fbf16322cd05eeb9f
                • Opcode Fuzzy Hash: 838871a958581ee41face61bd42299d32fa4a16dc4b832c476728f2296bf009b
                • Instruction Fuzzy Hash: BD713221B0CA4B95EB00BB29D89737927A0EB84B88F504636CE0CC77A9EF3CE455C341
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: Advapi32.dll$EventActivityIdControl
                • API String ID: 4061214504-2884944642
                • Opcode ID: 7afc532160c1c0979fe5f4cd5abb77bc1676417acaaabf79f73bc9ee226c55d9
                • Instruction ID: 21d43db9253d573c574f7f1d898e1f0a1277be1b7bbb030672027bdfc7844328
                • Opcode Fuzzy Hash: 7afc532160c1c0979fe5f4cd5abb77bc1676417acaaabf79f73bc9ee226c55d9
                • Instruction Fuzzy Hash: E901DE65A1DB4186EB20FF10F89616A77A0FB88794F845A35E98EC276CDE3CD154CF40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: FreeString$DestroyKillMessagePostQuitTimerWindow
                • String ID:
                • API String ID: 2391587098-0
                • Opcode ID: 56ccf6a597dfb15f952642e2b08fa918e7f5d510c0c6df4be4ea0eda09e5396e
                • Instruction ID: b113c1790b5e94e7779528093996b5d9b5403e1805709548d66307996fdbc738
                • Opcode Fuzzy Hash: 56ccf6a597dfb15f952642e2b08fa918e7f5d510c0c6df4be4ea0eda09e5396e
                • Instruction Fuzzy Hash: 2C511236A09F0682EB14BF25E49636973A4FB48B84F444632DE0E87768DF3CE4A4C340
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Free$AddressErrorHandleKillLastLibraryMessageModuleProcStringTimerTrace
                • String ID: m_pRdpSessionAgent->CheckAttendees failed!
                • API String ID: 2506179773-126262845
                • Opcode ID: e8e040f5a6311ebfa7057713b5df97af77c1afad7f3d83edd3bbf340a6f2aeeb
                • Instruction ID: 7094aac420e3147acd59b230ec94ca18ab10b8faa6987393b8032b7359213922
                • Opcode Fuzzy Hash: e8e040f5a6311ebfa7057713b5df97af77c1afad7f3d83edd3bbf340a6f2aeeb
                • Instruction Fuzzy Hash: 2B512D61E1CA4A82EB14FB19D4C626C27A0FB88B99F544736DE5E837A8DF3CE455C300
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RegGetValueW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF644D54392), ref: 00007FF644D54496
                  • Part of subcall function 00007FF644D521A8: GetModuleHandleExA.KERNEL32 ref: 00007FF644D521DC
                  • Part of subcall function 00007FF644D521A8: GetProcAddress.KERNEL32 ref: 00007FF644D521F2
                  • Part of subcall function 00007FF644D521A8: FreeLibrary.KERNEL32 ref: 00007FF644D52212
                  • Part of subcall function 00007FF644D51054: TraceMessage.ADVAPI32 ref: 00007FF644D5108B
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AddressFreeHandleLibraryMessageModuleProcTraceValue
                • String ID: ShadowTimeout$Software\Policies\Microsoft\Windows NT\Terminal Services$W
                • API String ID: 109465870-1671378410
                • Opcode ID: df5a8f03d2a724c99992634d06448a68cc43a7253830fa40fe034691fcf77755
                • Instruction ID: 3005b5b03894c075bc8a95dc39dcded79999cb476678c04aad125a8a548bd0ed
                • Opcode Fuzzy Hash: df5a8f03d2a724c99992634d06448a68cc43a7253830fa40fe034691fcf77755
                • Instruction Fuzzy Hash: 22415D31A0C65686EB10FB15E4CA6793391FB84758F900236DE5D87298EF7DD906C741
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AddressCreateFreeHandleInstanceLibraryModuleProc
                • String ID: CreateInstance CLSID_RDPSession failed!$Enabling clipboard support failed!$IRDPSRAPISharingSession::Open failed!
                • API String ID: 3463782917-1325280686
                • Opcode ID: 35b44ffb34c0471cb7e220fbcef381c93536f983701d6675b6f00e236d1cb0a2
                • Instruction ID: b748334bde15e3ca13b1b67f71fe89c9b2365382f3aa0a962c3cdb306628512c
                • Opcode Fuzzy Hash: 35b44ffb34c0471cb7e220fbcef381c93536f983701d6675b6f00e236d1cb0a2
                • Instruction Fuzzy Hash: CB414F21B0CB4A85EB11BF9AE4C227927A1EB84B88F944235DE5DC37A9DF3CE455C340
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • WinStationShadowStop2.WINSTA(?,?,?,?,00000000,00007FF644D51639,?,?,?,?,?,00007FF644D5145F), ref: 00007FF644D53B50
                • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF644D51639,?,?,?,?,?,00007FF644D5145F), ref: 00007FF644D53B61
                  • Part of subcall function 00007FF644D521A8: GetModuleHandleExA.KERNEL32 ref: 00007FF644D521DC
                  • Part of subcall function 00007FF644D521A8: GetProcAddress.KERNEL32 ref: 00007FF644D521F2
                  • Part of subcall function 00007FF644D521A8: FreeLibrary.KERNEL32 ref: 00007FF644D52212
                  • Part of subcall function 00007FF644D51098: TraceMessage.ADVAPI32 ref: 00007FF644D51117
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AddressErrorFreeHandleLastLibraryMessageModuleProcShadowStationStop2Trace
                • String ID: ReleaseSharer failed!$WinStationShadowStop2 failed
                • API String ID: 2989075785-109815289
                • Opcode ID: d0003155a8498750396d6284d63bbc7b50cc88c3f7a108c67e540986c7f4205f
                • Instruction ID: a12d7a8cc34648067836dd86eb3563564a6392c1f501c0bbbad1c21a585b0601
                • Opcode Fuzzy Hash: d0003155a8498750396d6284d63bbc7b50cc88c3f7a108c67e540986c7f4205f
                • Instruction Fuzzy Hash: 64317A22A0CA4685EB54BF1AE4C637927A0EF84B89F940636DE4CC73A8DF3DE455C300
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Window$LongProc$AddressFreeHandleLibraryMessageModuleTrace
                • String ID: OnTimer failed
                • API String ID: 3473865101-436978542
                • Opcode ID: a04f90b2efc03d58b871513ac9a4fd026b125cb9b8c6ec6d9e8a78ba2fea9941
                • Instruction ID: b30dfe1c572336ed91687ae157eb414658dda035ae73aa3318c172c91562829b
                • Opcode Fuzzy Hash: a04f90b2efc03d58b871513ac9a4fd026b125cb9b8c6ec6d9e8a78ba2fea9941
                • Instruction Fuzzy Hash: DE219021F0CA4681EB10BF16E48216D7750EB89B99F540735DE6D977E9DE3CE442C340
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Info$AddrFree$AddressHandleLibraryModuleNameProcmemset
                • String ID:
                • API String ID: 241747934-0
                • Opcode ID: ab8bd23acba36cde8c452a15ec4bca00e5e412a55da5a98bfe46e51a1c8f56f4
                • Instruction ID: bd9bc7cb56be427c59b4d410f7920403ef99643d72b40bc9509f707a7be63e18
                • Opcode Fuzzy Hash: ab8bd23acba36cde8c452a15ec4bca00e5e412a55da5a98bfe46e51a1c8f56f4
                • Instruction Fuzzy Hash: 38418132A0CB5686EB10FB15D4827A967A1FFC4B94F454236DE9C87658EF3CE905C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000019.00000002.397224505.00007FF644D51000.00000020.00020000.sdmp, Offset: 00007FF644D50000, based on PE: true
                • Associated: 00000019.00000002.397160169.00007FF644D50000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397262108.00007FF644D58000.00000002.00020000.sdmp Download File
                • Associated: 00000019.00000002.397291213.00007FF644D5C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AddressFreeHandleLibraryMessageModuleProcTraceValue
                • String ID: Shadow$Software\Policies\Microsoft\Windows NT\Terminal Services
                • API String ID: 109465870-1250006247
                • Opcode ID: 518c7f3aedd901a8b2fe8ebe05e6649a798a0a6bc81bdefa24c5b5737644f9e0
                • Instruction ID: 376b07f094875580aea50d1a6bd32574423066b10765c7d15b197c7d78c94eb0
                • Opcode Fuzzy Hash: 518c7f3aedd901a8b2fe8ebe05e6649a798a0a6bc81bdefa24c5b5737644f9e0
                • Instruction Fuzzy Hash: 3F415E31A0C75686EB11FB19E4C63B936A2FB85B48F510236DE5D83298EF3CE506C741
                Uniqueness

                Uniqueness Score: -1.00%

                Executed Functions

                APIs
                Memory Dump Source
                • Source File: 0000001C.00000002.432084318.000001F969FD0000.00000040.00000001.sdmp, Offset: 000001F969FD0000, based on PE: true
                Similarity
                • API ID: ProtectVirtual$FunctionTable
                • String ID:
                • API String ID: 847647671-0
                • Opcode ID: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction ID: 77d23bf44bc829fba52d03b0eee211350859cdc371a046bcc5271464fadce5a6
                • Opcode Fuzzy Hash: 75ec9f23c294f1b91f48f20b57dd5cc1f886561a981db544c7b3bcf3c6961842
                • Instruction Fuzzy Hash: 12B15776618BC58AD730CB1AE4407DEB7A0F7C9B90F118026DEC997B58CB7AC8568F40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,000001F969FD29A8), ref: 000001F969FD20A7
                Memory Dump Source
                • Source File: 0000001C.00000002.432084318.000001F969FD0000.00000040.00000001.sdmp, Offset: 000001F969FD0000, based on PE: true
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction ID: b06fee6821166e2a8bea9382e6c255e8bff884d21d08584f64a812c61fae6c57
                • Opcode Fuzzy Hash: e198c79539a4ed8551c2286ff6a3e0dfce1ca71c07a98c6b4ee2f43e3e4de89f
                • Instruction Fuzzy Hash: 45313C72715B9486D790DF1AE45479A7BA0F389BD4F215026EF8E87B18DF3AC446CB00
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Close$Value$Open$HandleUninitializememset$EnumEventQuerywcscmp$CreateDeleteGuidsHeapInfoInformationInitializeParametersRegisterSystemTrace
                • String ID: /restart$/startSecureDesktopToolsForOOBE$Configuration$Local\EaseOfAccessDialog$OOBEInProgress$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\OOBE$Software\Microsoft\Windows NT\CurrentVersion\AccessibilityTemp$StartSecureDesktopToolsForOOBE$System\Setup
                • API String ID: 2500487270-1840318330
                • Opcode ID: ddb8320a8493bdfb89beb55715ccbb07183cf6271a31daa762f75ca5cedf4b1c
                • Instruction ID: 7fdaf66814a28625887d159534467a0308767df9e6daebdec1d0f06067819314
                • Opcode Fuzzy Hash: ddb8320a8493bdfb89beb55715ccbb07183cf6271a31daa762f75ca5cedf4b1c
                • Instruction Fuzzy Hash: 4D120932A18F4299FB60AF21E8406A9A7B5FF547ACF840135DA4D47A54DF3CE52EC720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Direct$Element@$Descendent@$FindV12@$Touch$Button@Click@ElementEvent@Event@2@@Listener@Listener@2@@SliderSlider@Updated@V12@@callocwcsstr
                • String ID: FilterKeys$HighContrast$MagnifierPane$Narrator$Osk$StickyKeys$magnifierpane$narrator$osk$screenreader
                • API String ID: 2339627324-1118713880
                • Opcode ID: fc350c334d9c982fc48df8c1248c302ec6f5d835f1add9020351acf8a7224c7a
                • Instruction ID: 61e4dba6f38414b425b930d96d633e930851d1d788d2cac4637572ca6b15172a
                • Opcode Fuzzy Hash: fc350c334d9c982fc48df8c1248c302ec6f5d835f1add9020351acf8a7224c7a
                • Instruction Fuzzy Hash: 72C11735A09E4299FB40AF21E8542A9A3B4BF44BA8FC44131D94E477A4DE3CE56FC360
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: EnvironmentErrorExpandInfoLastParametersStringsSystem_wtoifreemallocwcscmp
                • String ID: %SystemRoot%\System32\ATBroker.exe$%s /start %s %s$/hardwarebuttonlaunch
                • API String ID: 2391191187-641792459
                • Opcode ID: a6e9c0136e2fff0beae3a14541ed609ef2acf246bb759aaa1ba7715206cff3ca
                • Instruction ID: 56e2c216b02f68336d948e18aa9eabff73911c623a0cfde24ee3ffab78ec907f
                • Opcode Fuzzy Hash: a6e9c0136e2fff0beae3a14541ed609ef2acf246bb759aaa1ba7715206cff3ca
                • Instruction Fuzzy Hash: 17918F36B09E4295FB14AF29A850769A2F0BF44BACF940134DD5E47794DF3CE46E8320
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CloseHandleOpen$EnvironmentEventExecuteExpandMutexShellSleepStrings
                • String ID: %SystemRoot%\system32\EaseOfAccessDialog.exe$261$Global\Windows.User.OOBE$Local\EaseOfAccessDialog$pagegroup=SettingsPageGroupEaseOfAccess$windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel
                • API String ID: 242458767-1167460931
                • Opcode ID: 6c83d67067d5e0abfaeb4412076566709541d628e6a539280a8e0ca6dd5ad977
                • Instruction ID: fdce7eca6b890bb81365006e9accadb331023a6f3b0a22cc77a0aeace352faec
                • Opcode Fuzzy Hash: 6c83d67067d5e0abfaeb4412076566709541d628e6a539280a8e0ca6dd5ad977
                • Instruction Fuzzy Hash: 17511B31A18E42A6FB54AF21E8547A9A370BF94768FC04435D94D476A4DF3CE52EC720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: System$Metrics$CreateDataInfoInstanceParametersQueryState
                • String ID:
                • API String ID: 2860316824-0
                • Opcode ID: 7ae3e4e481ea7004b39eb693622f9d51e3942bea4e9d0191542698dc02285da0
                • Instruction ID: 88c2666b4c1e6ea4d6828e30fa52d0c5e9822d1e5c7e0ef173e1d49b9a84ed42
                • Opcode Fuzzy Hash: 7ae3e4e481ea7004b39eb693622f9d51e3942bea4e9d0191542698dc02285da0
                • Instruction Fuzzy Hash: 8A512432F14A128AF700DFB5D8446ADB7B1BB4876CF940139DA0DA7A98DF38E45AC710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: ErrorLast$LanguagesPreferredThread$InfoLocale
                • String ID:
                • API String ID: 2211544732-0
                • Opcode ID: 4dcb02771cb38dcbbb2a860c3b8be67944e4b48af7dc1bfaa647c9fed4039a81
                • Instruction ID: 6c2486c319128d95406ba502ddf7a5bc83fcca9f928f977bd49e50920124bb97
                • Opcode Fuzzy Hash: 4dcb02771cb38dcbbb2a860c3b8be67944e4b48af7dc1bfaa647c9fed4039a81
                • Instruction Fuzzy Hash: 9431C636604F428AFB116F69D4403A9E6B1AFC4BB4F954135DE1D87380EE3DD86AC260
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • AllocateAndInitializeSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF71984398E,?,?,?,00007FF71984360D), ref: 00007FF71984510C
                • CheckTokenMembership.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF71984398E,?,?,?,00007FF71984360D), ref: 00007FF719845127
                • FreeSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF71984398E,?,?,?,00007FF71984360D), ref: 00007FF719845133
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AllocateCheckFreeInitializeMembershipToken
                • String ID:
                • API String ID: 3429775523-0
                • Opcode ID: d3b5a0db0ebd6d8af241467ae3b987c7fd0f3b7f99fe4605866af3dad0ec1a6a
                • Instruction ID: fe649ae8c9a3a7dff0f8d44b1aee8b8b75bbe238afe71fbaf54966e0c68bd76c
                • Opcode Fuzzy Hash: d3b5a0db0ebd6d8af241467ae3b987c7fd0f3b7f99fe4605866af3dad0ec1a6a
                • Instruction Fuzzy Hash: B1318C72F14B118AEB209F20D4406AD77B8FB48B98F900536DE5D53B58CF39D55ACBA0
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: File$AttributesDelete$Value$CloseMessageOpenQueryTracememset
                • String ID: ,Narrator$,magnifierpane$,osk$Configuration$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility$Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$Startup$\Magnifier.lnk$\Narrator.lnk$\On-Screen Keyboard.lnk
                • API String ID: 21747553-2814762555
                • Opcode ID: 54be00608581e98c7218101f25a0995667f3f245dcd43d6be9bdb3a0552e4050
                • Instruction ID: 838224d6dccda7b68e1581b44ae40fed4f87873b806358f785ad104e3edb849e
                • Opcode Fuzzy Hash: 54be00608581e98c7218101f25a0995667f3f245dcd43d6be9bdb3a0552e4050
                • Instruction Fuzzy Hash: BDC17E32A08E4295EB10EF15E840669A3B0FF84BB8F940131DA5D57BA5DE3CD86FC760
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Value$Enum$DeleteOpenTreefreemalloc
                • String ID:
                • API String ID: 176601195-0
                • Opcode ID: bc9edce9d89e1307b01afa81d57237d9f06e1de3d7c61f297e0fddedac398fdd
                • Instruction ID: fc85a2453c3120194d5eeccc80625f09091e10739265e8cfa112a97f7b73f66f
                • Opcode Fuzzy Hash: bc9edce9d89e1307b01afa81d57237d9f06e1de3d7c61f297e0fddedac398fdd
                • Instruction Fuzzy Hash: 77715D32608F4186E7609F15E84436AF7B4FB85BA8F940139DA8D47BA8DF3DD45ACB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: wcsstr$ClassDirectSwitch@Touch$#344CloseInfoInfo@2@OpenPtr@ToggleValue@
                • String ID: SystemSetting$osk$screenreader
                • API String ID: 3122511180-1747744911
                • Opcode ID: 80a2c07d4557d15ef9b9e2d4be00b173a1816130124ab7c55f7643841ebe3b86
                • Instruction ID: ffb43f4add6840f3cfd0b85b62050898289ce23119f6a562741cc0e6de042d28
                • Opcode Fuzzy Hash: 80a2c07d4557d15ef9b9e2d4be00b173a1816130124ab7c55f7643841ebe3b86
                • Instruction Fuzzy Hash: 57512C72A08F4296FB50AF15E840369A370FF85BA8F844235DA5D477A5DF2CE86F8350
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Value$CloseOpenQuerywcscmp
                • String ID: Software\Microsoft\Windows NT\CurrentVersion\AccessibilityTemp$SystemSetting
                • API String ID: 2747577601-2369969224
                • Opcode ID: b5bcf65041a155c43cb9252edcb9dbc7843c0692a11fa7bf896be8580dfb07b8
                • Instruction ID: 85abebecb0b052dbad8050ccb96f70b97be17dd10a6e9a44faaf609fc18f4942
                • Opcode Fuzzy Hash: b5bcf65041a155c43cb9252edcb9dbc7843c0692a11fa7bf896be8580dfb07b8
                • Instruction Fuzzy Hash: 3A517F32609B8199EB60AF25D8007AD73B4FF447A8F804231DE5C4BBA4DF38D56AC720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Thread$CloseCurrentDesktopHandleInformationMutexObjectOpenUser_wcsicmp
                • String ID: Global\Windows.Machine.OOBE
                • API String ID: 3709307039-590879880
                • Opcode ID: 502b816f062ea7b0d833f4d550e084c3cd26b2378e6ccf3638f2fbfe0253a862
                • Instruction ID: 6261af92bf71720b65cefd634783526cf6d32913694ed5fd9b7d50e5d295612c
                • Opcode Fuzzy Hash: 502b816f062ea7b0d833f4d550e084c3cd26b2378e6ccf3638f2fbfe0253a862
                • Instruction Fuzzy Hash: 12114F31A19F4296FB41AF61A8505B9B3B0BF99B68F941035D98D03664EF3CE46EC720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CloseOpen$Enummalloc
                • String ID: @$Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs
                • API String ID: 530395120-420448258
                • Opcode ID: 59e9892eea6e511af203d2d6c73d259ec1af2829138dfff8e6ff9de180712daf
                • Instruction ID: f79f4b3d506e9172fce2e0e3df441f2ed726db019880c40f8e24327a0a7892ce
                • Opcode Fuzzy Hash: 59e9892eea6e511af203d2d6c73d259ec1af2829138dfff8e6ff9de180712daf
                • Instruction Fuzzy Hash: CA516B32619F8185EB10DF25E4506ADB3B4FB88BA8F944235DE9D07798DF38D46AC720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                • String ID:
                • API String ID: 4104442557-0
                • Opcode ID: 9dc5e3af8b90c4035541296f033f6130a180e0092d40a2a39b8345c077525c50
                • Instruction ID: 5496eb7ffb53b569cf7b513337e24b2bc06f1f76d03a9bff5b8095300bd62e20
                • Opcode Fuzzy Hash: 9dc5e3af8b90c4035541296f033f6130a180e0092d40a2a39b8345c077525c50
                • Instruction Fuzzy Hash: E1114D22A05F419AEB40EF71E8451A973B4FB0976CB801A35EA5D83B54EF7CD1AE8350
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                  • Part of subcall function 00007FF7198450A4: AllocateAndInitializeSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF71984398E,?,?,?,00007FF71984360D), ref: 00007FF71984510C
                  • Part of subcall function 00007FF7198450A4: CheckTokenMembership.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF71984398E,?,?,?,00007FF71984360D), ref: 00007FF719845127
                  • Part of subcall function 00007FF7198450A4: FreeSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF71984398E,?,?,?,00007FF71984360D), ref: 00007FF719845133
                • RegOpenKeyExW.ADVAPI32(?,00007FF7198438C5,?,?,?,00007FF71984360D), ref: 00007FF719845330
                • RegCloseKey.ADVAPI32(?,?,?,00007FF71984360D), ref: 00007FF719845348
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: AllocateCheckCloseFreeInitializeMembershipOpenToken
                • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\OOBE$SettingConfiguration
                • API String ID: 3597346664-4018854219
                • Opcode ID: 7912b3958522c4a07b769dfc1a474aa7aa84ff43947ded795a75db534e60c82f
                • Instruction ID: 039325bdf1fdf82d4f715e49a5eb22eb255a4df450614d2371402ca91184dc47
                • Opcode Fuzzy Hash: 7912b3958522c4a07b769dfc1a474aa7aa84ff43947ded795a75db534e60c82f
                • Instruction Fuzzy Hash: CA318C36618F4289EB10AF25E40077DA7B0AF45BACF844535DE4C43AA5DFBCD46E8B20
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CloseHandleInfoParametersSystem_wtoiwcscmp
                • String ID: SystemSetting
                • API String ID: 1505865576-168466611
                • Opcode ID: 17fcf7f6d24c718004be0b3a9c53146c9e735c9e7c7a9d0ef425ad426cb31443
                • Instruction ID: 849726e65a8e4bc92c6d9c349a11587d5544cefbbbe0234ecd94695f6639761e
                • Opcode Fuzzy Hash: 17fcf7f6d24c718004be0b3a9c53146c9e735c9e7c7a9d0ef425ad426cb31443
                • Instruction Fuzzy Hash: 3D218032A08E028AEB60AF15D490679A3B1FF84BACF904131DA8D47655DF3CE46BCB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: Process$CloseCurrentHandleObjectOpen
                • String ID: WinlogonAccess
                • API String ID: 1681684634-4213033531
                • Opcode ID: 11876551f9b51f0bb783ac6015299b63de10be0d50ddea0096171ab0a7ec65ad
                • Instruction ID: 1ff6f75fcebed32fe38da6fc4c842e35a73019a3b794823f38c1e2f55192f043
                • Opcode Fuzzy Hash: 11876551f9b51f0bb783ac6015299b63de10be0d50ddea0096171ab0a7ec65ad
                • Instruction Fuzzy Hash: C3012C32A14B4186FB44AF55E884065A2B1FF88F98F994039DA4E03758DE3DE95BC710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SystemParametersInfoW.USER32 ref: 00007FF719847794
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7198437E6), ref: 00007FF71984779E
                • SystemParametersInfoW.USER32 ref: 00007FF7198477EA
                • SendNotifyMessageW.USER32 ref: 00007FF719847804
                  • Part of subcall function 00007FF719847908: GetCurrentThreadId.KERNEL32 ref: 00007FF71984791F
                  • Part of subcall function 00007FF719847908: GetThreadDesktop.USER32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7198477D0), ref: 00007FF719847927
                  • Part of subcall function 00007FF719847908: GetUserObjectInformationW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7198477D0), ref: 00007FF71984795E
                  • Part of subcall function 00007FF719847908: _wcsicmp.MSVCRT ref: 00007FF719847977
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: InfoParametersSystemThread$CurrentDesktopErrorInformationLastMessageNotifyObjectSendUser_wcsicmp
                • String ID:
                • API String ID: 1048042436-0
                • Opcode ID: 5e83e882a44533de2483630d57918caa63f6b1816fd0fdc2972829cb76353c5b
                • Instruction ID: d8c8f40a305662e70ef7b817d4bea6ccbd20f8e8b0375a83a8964c11c4994bf5
                • Opcode Fuzzy Hash: 5e83e882a44533de2483630d57918caa63f6b1816fd0fdc2972829cb76353c5b
                • Instruction Fuzzy Hash: 0631B931B04A828AE764EF21E40067973F0FF84BACB954239DA4D47654DF3CD91AC715
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                • String ID:
                • API String ID: 140117192-0
                • Opcode ID: dd0721d1b9d6f82719ebf90cdc4234232eaf177cf7f6606a091f989661969268
                • Instruction ID: d92d8ac63c9088042868d264246733722b477f4037a4515bc2bbe6a85fcb59f1
                • Opcode Fuzzy Hash: dd0721d1b9d6f82719ebf90cdc4234232eaf177cf7f6606a091f989661969268
                • Instruction Fuzzy Hash: 35419235A19F0195FB50AF08E851366B7B4FB887A8F900136DA8D43764DF7CE46E8722
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                • Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs\, xrefs: 00007FF7198446FB
                Memory Dump Source
                • Source File: 0000001C.00000002.436506401.00007FF719841000.00000020.00020000.sdmp, Offset: 00007FF719840000, based on PE: true
                • Associated: 0000001C.00000002.436493018.00007FF719840000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436525470.00007FF719850000.00000002.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436541748.00007FF719858000.00000004.00020000.sdmp Download File
                • Associated: 0000001C.00000002.436555424.00007FF71985A000.00000002.00020000.sdmp Download File
                Similarity
                • API ID: CloseOpenwcscspnwcsspn
                • String ID: Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs\
                • API String ID: 4014168773-1213720956
                • Opcode ID: e10a290f403ae59eb6faa29fc30f71c672e0cab7105cf0937cff7a0d3b21307d
                • Instruction ID: fd2066d8693967c2dcbeb09b1f97f2fcadd7c77534ea2b1fa05f09b8768557df
                • Opcode Fuzzy Hash: e10a290f403ae59eb6faa29fc30f71c672e0cab7105cf0937cff7a0d3b21307d
                • Instruction Fuzzy Hash: D3413C76A11E1589EB00AF79D8406AC6770FB45BBCF544335EA2E13AE9CF28D46AC350
                Uniqueness

                Uniqueness Score: -1.00%