Create Interactive Tour

Windows Analysis Report IcePick.exe

Overview

General Information

Sample Name:IcePick.exe
Analysis ID:512224
MD5:8d8cf0304728ca81818a868f1f06224d
SHA1:4abcf7b1ffbbd93dace46a790d9001a8451065c7
SHA256:8b10986bf59cc6c50698fd9a3de7522cc0767da1655f4c5c51601187eebbdac8
Tags:exe
Infos:

Most interesting Screenshot:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Found malware configuration
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (window names)
Writes to foreign memory regions
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains section with special chars
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Entry point lies outside standard sections
Contains long sleeps (>= 3 min)
Enables debug privileges
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Detected TCP or UDP traffic on non-standard ports
Contains capabilities to detect virtual machines
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • IcePick.exe (PID: 3176 cmdline: 'C:\Users\user\Desktop\IcePick.exe' MD5: 8D8CF0304728CA81818A868F1F06224D)
    • AppLaunch.exe (PID: 6980 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe MD5: 6807F903AC06FF7E1670181378690B22)
    • WerFault.exe (PID: 6876 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 548 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{
  "C2 url": [
    "185.255.133.25:18225"
  ],
  "Bot Id": "onyxx0.1"
}
SourceRuleDescriptionAuthorStrings
00000000.00000003.695430089.0000000000782000.00000040.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000000.698153396.0000000000462000.00000004.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000000.700451355.0000000000462000.00000004.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000002.00000002.769470353.0000000000402000.00000020.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            2.2.AppLaunch.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              0.2.IcePick.exe.463630.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                0.3.IcePick.exe.780000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.0.IcePick.exe.463630.3.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.2.IcePick.exe.463630.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configuration
                      Source: 2.2.AppLaunch.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.255.133.25:18225"], "Bot Id": "onyxx0.1"}
                      Multi AV Scanner detection for submitted file
                      Source: IcePick.exeVirustotal: Detection: 24%Perma Link
                      Source: IcePick.exeReversingLabs: Detection: 20%
                      Machine Learning detection for sample
                      Source: IcePick.exeJoe Sandbox ML: detected
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_0A15497C CryptUnprotectData,2_2_0A15497C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_0A1550D0 CryptUnprotectData,2_2_0A1550D0
                      Source: IcePick.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Binary string: profapi.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: advapi32.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb5 source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: fltLib.pdb) source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: powrprof.pdb3 source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shell32.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdbK source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: profapi.pdb? source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: shell32.pdbM source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdbA source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000005.00000003.711006337.0000000000DAF000.00000004.00000001.sdmp
                      Source: Joe Sandbox ViewASN Name: SUPERSERVERSDATACENTERRU SUPERSERVERSDATACENTERRU
                      Source: Joe Sandbox ViewIP Address: 185.255.133.25 185.255.133.25
                      Source: global trafficTCP traffic: 192.168.2.4:49772 -> 185.255.133.25:18225
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.255.133.25
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: l9https://www.facebook.com/chat/video/videocalldownload.php equals www.facebook.com (Facebook)
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: romium PDF Plugin","versions":[{"comment":"Chromium PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"divx-player":{"group_name_matcher":"*DivX Web Player*","help_url":"https://support.google.com/chrome/?p=plugin_divx","lang":"en-US","mime_types":["video/divx","video/x-matroska"],"name":"DivX Web Player","url":"http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe","versions":[{"status":"requires_authorization","version":"1.4.3.4"}]},"facebook-video-calling":{"group_name_matcher":"*Facebook Video*","lang":"en-US","mime_types":["application/skypesdk-plugin"],"name":"Facebook Video Calling","url":"https://www.facebook.com/chat/video/videocalldownload.php","versions":[{"comment":"We do not track version information for the Facebook Video Calling Plugin.","status":"requires_authorization","version":"0"}]},"google-chrome-pdf":{"group_name_matcher":"*Chrome PDF Viewer*","mime_types":[],"name":"Chrome PDF Viewer","versions":[{"comment":"Google Chrome PDF Viewer has no version information.","status":"fully_trusted","version":"0"}]},"google-chrome-pdf-plugin":{"group_name_matcher":"*Chrome PDF Plugin*","mime_types":[],"name":"Chrome PDF Plugin","versions":[{"comment":"Google Chrome PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"google-earth":{"group_name_matcher":"*Google Earth*","lang":"en-US","mime_types":["application/geplugin"],"name":"Google Earth","url":"http://www.google.com/earth/explore/products/plugin.html","versions":[{"comment":"We do not track version information for the Google Earth Plugin.","status":"requires_authorization","version":"0"}]},"google-talk":{"group_name_matcher":"*Google Talk*","mime_types":[],"name":"Google Talk","versions":[{"comment":"'Google Talk Plugin' and 'Google Talk Plugin Video Accelerator' use two completely different versioning schemes, so we can't define a minimum version.","status":"requires_authorization","version":"0"}]},"google-update":{"group_name_matcher":"Google Update","mime-types":[],"name":"Google Update","versions":[{"comment":"Google Update plugin is versioned but kept automatically up to date","status":"requires_authorization","version":"0"}]},"ibm-java-runtime-environment":{"group_name_matcher":"*IBM*Java*","mime_types":["application/x-java-applet","application/x-java-applet;jpi-version=1.7.0_05","application/x-java-applet;version=1.1","application/x-java-applet;version=1.1.1","application/x-java-applet;version=1.1.2","application/x-java-applet;version=1.1.3","application/x-java-applet;version=1.2","application/x-java-applet;version=1.2.1","application/x-java-applet;version=1.2.2","application/x-java-applet;version=1.3","application/x-java-applet;version=1.3.1","application/x-java-applet;version=1.4","application/x-java-applet;version=1.4.1","application/x-java-applet;version=1.4.2","application/x-java-applet;version=1.5","application/x-java-applet;version=1.6","application/x-java-applet;version=1.7","application/x-j
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://appldnld.apple.com/QuickTime/041-3089.20111026.Sxpr4/QuickTimeInstaller.exe
                      Source: IcePick.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: IcePick.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                      Source: IcePick.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: WerFault.exe, 00000005.00000003.742442450.0000000004B64000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: IcePick.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                      Source: IcePick.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: IcePick.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                      Source: IcePick.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: IcePick.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: IcePick.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
                      Source: IcePick.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://forms.rea
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://forms.real.com/real/realone/download.html?type=rpsp_us
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://go.micros
                      Source: IcePick.exeString found in binary or memory: http://ocsp.digicert.com0C
                      Source: IcePick.exeString found in binary or memory: http://ocsp.digicert.com0N
                      Source: IcePick.exeString found in binary or memory: http://ocsp.digicert.com0O
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultL
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                      Source: AppLaunch.exe, 00000002.00000002.770894008.0000000006440000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://service.r
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://service.real.com/realplayer/security/02062012_player/en/
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://support.a
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://support.apple.com/kb/HT203092
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.770894008.0000000006440000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.771671693.000000000672A000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Responseme
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.771671693.000000000672A000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Responsebl
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                      Source: AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                      Source: AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                      Source: IcePick.exeString found in binary or memory: http://www.digicert.com/CPS0
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://www.google.com/earth/explore/products/plugin.html
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: http://www.interoperabilitybridges.com/wmp-extension-for-chrome
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: IcePick.exe, 00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.769470353.0000000000402000.00000020.00000001.sdmpString found in binary or memory: https://api.ip.sb/ip
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://get.adob
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://helpx.ad
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.771122177.000000000658C000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.771122177.000000000658C000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_divx
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_java
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_pdf
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_quicktime
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_real
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_shockwave
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_wmp
                      Source: AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6258784
                      Source: IcePick.exeString found in binary or memory: https://www.digicert.com/CPS0
                      Source: AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                      System Summary:

                      barindex
                      PE file contains section with special chars
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\IcePick.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 548
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE0_2_0111CEBE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_0099EC082_2_0099EC08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F709782_2_09F70978
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F780902_2_09F78090
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F700402_2_09F70040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F7C2482_2_09F7C248
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F781532_2_09F78153
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F781582_2_09F78158
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F75B442_2_09F75B44
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09F75B482_2_09F75B48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_0A153F002_2_0A153F00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_0A1515502_2_0A151550
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_0A1536B02_2_0A1536B0
                      Source: IcePick.exe, 00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBouillis.exe4 vs IcePick.exe
                      Source: IcePick.exeStatic PE information: invalid certificate
                      Source: IcePick.exeStatic PE information: Number of sections : 12 > 10
                      Source: IcePick.exeStatic PE information: Section: ZLIB complexity 0.997502790179
                      Source: IcePick.exeStatic PE information: Section: ZLIB complexity 0.9970703125
                      Source: IcePick.exeStatic PE information: Section: ZLIB complexity 0.9970703125
                      Source: IcePick.exeStatic PE information: Section: ZLIB complexity 0.99876434949
                      Source: IcePick.exeStatic PE information: Section: .boot ZLIB complexity 0.994269156831
                      Source: IcePick.exeVirustotal: Detection: 24%
                      Source: IcePick.exeReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\IcePick.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\IcePick.exe 'C:\Users\user\Desktop\IcePick.exe'
                      Source: C:\Users\user\Desktop\IcePick.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Source: C:\Users\user\Desktop\IcePick.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 548
                      Source: C:\Users\user\Desktop\IcePick.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CB7.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@0/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: IcePick.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3176
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: IcePick.exeStatic file information: File size 1638856 > 1048576
                      Source: IcePick.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x15d800
                      Source: IcePick.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: profapi.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: advapi32.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb5 source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: fltLib.pdb) source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: powrprof.pdb3 source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shell32.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdbK source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: profapi.pdb? source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: shell32.pdbM source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdbk source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000005.00000003.722029473.0000000004FF0000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdbA source: WerFault.exe, 00000005.00000003.722044572.0000000004FF7000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000005.00000003.722009819.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000005.00000003.711006337.0000000000DAF000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edi; mov dword ptr [esp], 3D085B98h0_2_011FFD8A
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push ecx; mov dword ptr [esp], ebp0_2_011FFD95
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 402BC54Ah; mov dword ptr [esp], eax0_2_01200108
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 6CD7730Ah; mov dword ptr [esp], ecx0_2_01200C23
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push ebp; mov dword ptr [esp], ebx0_2_01201374
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 0704697Dh; mov dword ptr [esp], eax0_2_012015FF
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 350C70D0h; mov dword ptr [esp], eax0_2_01201619
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push ebx; mov dword ptr [esp], ebp0_2_01201795
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push ebx; mov dword ptr [esp], ebp0_2_012018C4
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edx; mov dword ptr [esp], 1999D829h0_2_012018DC
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 2DC9DC64h; mov dword ptr [esp], eax0_2_01201901
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 636E5F2Dh; mov dword ptr [esp], ebx0_2_0120190C
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 2A6B6DDDh; mov dword ptr [esp], ebx0_2_0120197E
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edx; mov dword ptr [esp], edi0_2_01202171
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edi; mov dword ptr [esp], ebx0_2_01202187
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edx; mov dword ptr [esp], ecx0_2_0120219F
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edx; mov dword ptr [esp], 153EB161h0_2_01202262
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 5C6CAE48h; mov dword ptr [esp], edx0_2_0120227A
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 186E5D7Bh; mov dword ptr [esp], ebx0_2_012022CB
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push eax; mov dword ptr [esp], 6B72B755h0_2_01202308
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push eax; mov dword ptr [esp], ebx0_2_01202413
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edi; mov dword ptr [esp], ebx0_2_01202427
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push esi; mov dword ptr [esp], ebx0_2_012025DE
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 6E72A319h; mov dword ptr [esp], edi0_2_01202E21
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edx; mov dword ptr [esp], 146B9CD7h0_2_01202E61
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push ebp; mov dword ptr [esp], ecx0_2_01202E7D
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push 44A8BDF8h; mov dword ptr [esp], edx0_2_01202EB9
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push esi; mov dword ptr [esp], ecx0_2_01202ECA
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push edx; mov dword ptr [esp], eax0_2_01202F4F
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push ebp; mov dword ptr [esp], edx0_2_01202FD9
                      Source: C:\Users\user\Desktop\IcePick.exeCode function: 0_2_0111CEBE push esi; mov dword ptr [esp], ebx0_2_01203014
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name:
                      Source: IcePick.exeStatic PE information: section name: .debug
                      Source: IcePick.exeStatic PE information: section name: .B1uj23u
                      Source: IcePick.exeStatic PE information: section name: .B1uj23u
                      Source: IcePick.exeStatic PE information: section name: .boot
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                      Source: IcePick.exeStatic PE information: real checksum: 0x1923ba should be: 0x19d5f3
                      Source: initial sampleStatic PE information: section name: entropy: 7.99432997785
                      Source: initial sampleStatic PE information: section name: entropy: 6.97723011536
                      Source: initial sampleStatic PE information: section name: .boot entropy: 7.96273504967
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Query firmware table information (likely to detect VMs)
                      Source: C:\Users\user\Desktop\IcePick.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Tries to detect sandboxes / dynamic malware analysis system (registry check)
                      Source: C:\Users\user\Desktop\IcePick.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                      Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 4204Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 6976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeRegistry key enumerated: More than 150 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindow / User API: threadDelayed 1820Jump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeSystem information queried: ModuleInformationJump to behavior
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: WerFault.exe, 00000005.00000003.742100992.0000000004B3E000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: AppLaunch.exe, 00000002.00000002.770020732.00000000006FD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000

                      Anti Debugging:

                      barindex
                      Tries to detect sandboxes and other dynamic analysis tools (window names)
                      Source: C:\Users\user\Desktop\IcePick.exeOpen window title or class name: regmonclass
                      Source: C:\Users\user\Desktop\IcePick.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\IcePick.exeOpen window title or class name: procmon_window_class
                      Source: C:\Users\user\Desktop\IcePick.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\IcePick.exeOpen window title or class name: filemonclass
                      Source: C:\Users\user\Desktop\IcePick.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regions
                      Source: C:\Users\user\Desktop\IcePick.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 3D7008Jump to behavior
                      Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
                      Source: C:\Users\user\Desktop\IcePick.exeMessage posted: Message id: QUERYENDSESSIONJump to behavior
                      Allocates memory in foreign processes
                      Source: C:\Users\user\Desktop\IcePick.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Injects a PE file into a foreign processes
                      Source: C:\Users\user\Desktop\IcePick.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\IcePick.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
                      Source: IcePick.exe, 00000000.00000000.699701948.00000000013E0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: IcePick.exe, 00000000.00000000.699701948.00000000013E0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: IcePick.exe, 00000000.00000000.699701948.00000000013E0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: IcePick.exe, 00000000.00000000.699701948.00000000013E0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected RedLine Stealer
                      Source: Yara matchFile source: 2.2.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.IcePick.exe.463630.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.IcePick.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.IcePick.exe.463630.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.695430089.0000000000782000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.698153396.0000000000462000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.700451355.0000000000462000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.769470353.0000000000402000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: AppLaunch.exe PID: 6980, type: MEMORYSTR
                      Tries to steal Crypto Currency Wallets
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior

                      Remote Access Functionality:

                      barindex
                      Yara detected RedLine Stealer
                      Source: Yara matchFile source: 2.2.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.IcePick.exe.463630.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.IcePick.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.IcePick.exe.463630.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.IcePick.exe.463630.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.695430089.0000000000782000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.698153396.0000000000462000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.700451355.0000000000462000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.769470353.0000000000402000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: AppLaunch.exe PID: 6980, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation221Path InterceptionProcess Injection312Masquerading1OS Credential Dumping1Security Software Discovery541Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools11LSASS MemoryProcess Discovery12Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion441Security Account ManagerVirtualization/Sandbox Evasion441SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection312NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsSystem Information Discovery124VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 512224 Sample: IcePick.exe Startdate: 30/10/2021 Architecture: WINDOWS Score: 100 20 Found malware configuration 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Yara detected RedLine Stealer 2->24 26 2 other signatures 2->26 6 IcePick.exe 2->6         started        process3 signatures4 28 Query firmware table information (likely to detect VMs) 6->28 30 Tries to detect sandboxes and other dynamic analysis tools (window names) 6->30 32 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 6->32 34 4 other signatures 6->34 9 AppLaunch.exe 5 6->9         started        13 WerFault.exe 23 9 6->13         started        process5 dnsIp6 18 185.255.133.25, 18225, 49772 SUPERSERVERSDATACENTERRU Russian Federation 9->18 36 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->36 38 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 9->38 40 Tries to harvest and steal browser information (history, passwords, etc) 9->40 42 Tries to steal Crypto Currency Wallets 9->42 16 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 13->16 dropped file7 signatures8

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand
                      SourceDetectionScannerLabelLink
                      IcePick.exe25%VirustotalBrowse
                      IcePick.exe20%ReversingLabsWin32.Infostealer.Generic
                      IcePick.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://service.r0%URL Reputationsafe
                      http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                      http://tempuri.org/0%URL Reputationsafe
                      http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id90%URL Reputationsafe
                      http://tempuri.org/Entity/Id22Responsebl0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id80%URL Reputationsafe
                      http://tempuri.org/Entity/Id50%URL Reputationsafe
                      http://tempuri.org/Entity/Id40%URL Reputationsafe
                      http://tempuri.org/Entity/Id70%URL Reputationsafe
                      http://tempuri.org/Entity/Id60%URL Reputationsafe
                      http://www.interoperabilitybridges.com/wmp-extension-for-chrome0%URL Reputationsafe
                      http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                      http://support.a0%URL Reputationsafe
                      http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id19Responseme0%Avira URL Cloudsafe
                      https://api.ip.sb/ip0%URL Reputationsafe
                      http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id200%URL Reputationsafe
                      http://tempuri.org/Entity/Id210%URL Reputationsafe
                      http://tempuri.org/Entity/Id220%URL Reputationsafe
                      http://tempuri.org/Entity/Id230%URL Reputationsafe
                      http://tempuri.org/Entity/Id240%URL Reputationsafe
                      http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                      http://forms.rea0%URL Reputationsafe
                      http://tempuri.org/Entity/Id100%URL Reputationsafe
                      http://tempuri.org/Entity/Id110%URL Reputationsafe
                      http://tempuri.org/Entity/Id120%URL Reputationsafe
                      http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id130%URL Reputationsafe
                      http://tempuri.org/Entity/Id140%URL Reputationsafe
                      http://tempuri.org/Entity/Id150%URL Reputationsafe
                      http://tempuri.org/Entity/Id160%URL Reputationsafe
                      http://tempuri.org/Entity/Id170%URL Reputationsafe
                      http://tempuri.org/Entity/Id180%URL Reputationsafe
                      http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id190%URL Reputationsafe
                      http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id8Response0%URL Reputationsafe

                      Download Network PCAP: filteredfull

                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sctAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                          high
                          https://duckduckgo.com/chrome_newtabAppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpfalse
                            high
                            http://service.rAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                              high
                              https://duckduckgo.com/ac/?q=AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2004/08/addressing/faultLAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                  high
                                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                    high
                                    http://tempuri.org/Entity/Id12ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://tempuri.org/AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://tempuri.org/Entity/Id2ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                      high
                                      http://tempuri.org/Entity/Id21ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                        high
                                        http://tempuri.org/Entity/Id9AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                          high
                                          http://tempuri.org/Entity/Id22ResponseblAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://tempuri.org/Entity/Id8AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://tempuri.org/Entity/Id5AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                            high
                                            http://tempuri.org/Entity/Id4AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://tempuri.org/Entity/Id7AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://tempuri.org/Entity/Id6AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                              high
                                              https://support.google.com/chrome/?p=plugin_realAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                high
                                                http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.interoperabilitybridges.com/wmp-extension-for-chromeAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://support.google.com/chrome/?p=plugin_pdfAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/ws/2004/10/wsat/faultAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2004/10/wsatAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://tempuri.org/Entity/Id15ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  http://forms.real.com/real/realone/download.html?type=rpsp_usAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    http://support.aAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        http://tempuri.org/Entity/Id6ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          http://tempuri.org/Entity/Id19ResponsemeAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://api.ip.sb/ipIcePick.exe, 00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.769470353.0000000000402000.00000020.00000001.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exeAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            https://support.google.com/chrome/?p=plugin_quicktimeAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/ws/2004/04/scAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                    high
                                                                                    http://tempuri.org/Entity/Id9ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=AppLaunch.exe, 00000002.00000002.771577371.0000000006714000.00000004.00000001.sdmpfalse
                                                                                      high
                                                                                      http://tempuri.org/Entity/Id20AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://tempuri.org/Entity/Id21AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://tempuri.org/Entity/Id22AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                        high
                                                                                        http://tempuri.org/Entity/Id23AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                          high
                                                                                          http://tempuri.org/Entity/Id24AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                            high
                                                                                            http://tempuri.org/Entity/Id24ResponseAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            http://tempuri.org/Entity/Id1ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                              high
                                                                                              http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                    high
                                                                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                      high
                                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                        high
                                                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                          high
                                                                                                          http://schemas.xmlsoap.org/ws/2004/08/addressingAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                            high
                                                                                                            https://support.google.com/chrome/?p=plugin_shockwaveAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                                                              high
                                                                                                              http://forms.reaAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                high
                                                                                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                  high
                                                                                                                  http://schemas.xmlsoap.org/ws/2004/04/trustAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                    high
                                                                                                                    http://tempuri.org/Entity/Id10AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmp, AppLaunch.exe, 00000002.00000002.770894008.0000000006440000.00000004.00000001.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    http://tempuri.org/Entity/Id11AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    http://tempuri.org/Entity/Id12AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    http://tempuri.org/Entity/Id16ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                      high
                                                                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                        high
                                                                                                                        http://tempuri.org/Entity/Id13AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        http://tempuri.org/Entity/Id14AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        http://tempuri.org/Entity/Id15AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        http://tempuri.org/Entity/Id16AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        http://schemas.xmlsoap.org/ws/2005/02/trust/NonceAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                          high
                                                                                                                          http://tempuri.org/Entity/Id17AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://tempuri.org/Entity/Id18AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://tempuri.org/Entity/Id5ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://tempuri.org/Entity/Id19AppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsAppLaunch.exe, 00000002.00000002.770772781.00000000063B1000.00000004.00000001.sdmpfalse
                                                                                                                            high
                                                                                                                            http://tempuri.org/Entity/Id10ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/RenewAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                              high
                                                                                                                              http://tempuri.org/Entity/Id8ResponseAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://support.google.com/chrome/?p=plugin_wmpAppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                                                                                high
                                                                                                                                http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                                  high
                                                                                                                                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0AppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://support.google.com/chrome/answer/6258784AppLaunch.exe, 00000002.00000002.771189421.00000000065A2000.00000004.00000001.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTAppLaunch.exe, 00000002.00000002.770920175.0000000006444000.00000004.00000001.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://schemas.xmlsoap.org/ws/2006/02/addressingidentityAppLaunch.exe, 00000002.00000002.770894008.0000000006440000.00000004.00000001.sdmpfalse
                                                                                                                                            high
                                                                                                                                            • No. of IPs < 25%
                                                                                                                                            • 25% < No. of IPs < 50%
                                                                                                                                            • 50% < No. of IPs < 75%
                                                                                                                                            • 75% < No. of IPs
                                                                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                            185.255.133.25
                                                                                                                                            unknownRussian Federation
                                                                                                                                            50113SUPERSERVERSDATACENTERRUtrue

                                                                                                                                            General Information

                                                                                                                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                            Analysis ID:512224
                                                                                                                                            Start date:30.10.2021
                                                                                                                                            Start time:13:49:10
                                                                                                                                            Joe Sandbox Product:CloudBasic
                                                                                                                                            Overall analysis duration:0h 7m 48s
                                                                                                                                            Hypervisor based Inspection enabled:false
                                                                                                                                            Report type:full
                                                                                                                                            Sample file name:IcePick.exe
                                                                                                                                            Cookbook file name:default.jbs
                                                                                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                            Number of analysed new started processes analysed:16
                                                                                                                                            Number of new started drivers analysed:0
                                                                                                                                            Number of existing processes analysed:0
                                                                                                                                            Number of existing drivers analysed:0
                                                                                                                                            Number of injected processes analysed:0
                                                                                                                                            Technologies:
                                                                                                                                            • HCA enabled
                                                                                                                                            • EGA enabled
                                                                                                                                            • HDC enabled
                                                                                                                                            • AMSI enabled
                                                                                                                                            Analysis Mode:default
                                                                                                                                            Analysis stop reason:Timeout
                                                                                                                                            Detection:MAL
                                                                                                                                            Classification:mal100.troj.spyw.evad.winEXE@4/7@0/1
                                                                                                                                            EGA Information:Failed
                                                                                                                                            HDC Information:
                                                                                                                                            • Successful, ratio: 60% (good quality ratio 20%)
                                                                                                                                            • Quality average: 29%
                                                                                                                                            • Quality standard deviation: 37.5%
                                                                                                                                            HCA Information:
                                                                                                                                            • Successful, ratio: 69%
                                                                                                                                            • Number of executed functions: 91
                                                                                                                                            • Number of non-executed functions: 8
                                                                                                                                            Cookbook Comments:
                                                                                                                                            • Adjust boot time
                                                                                                                                            • Enable AMSI
                                                                                                                                            • Found application associated with file extension: .exe
                                                                                                                                            Warnings:
                                                                                                                                            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                                                                                                            • Excluded IPs from analysis (whitelisted): 20.50.102.62, 104.208.16.94, 80.67.82.235, 80.67.82.211, 20.54.110.249, 52.251.79.25, 40.112.88.60
                                                                                                                                            • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, onedsblobprdcus16.centralus.cloudapp.azure.com
                                                                                                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                            TimeTypeDescription
                                                                                                                                            13:50:42API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                            13:50:53API Interceptor13x Sleep call for process: AppLaunch.exe modified
                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                            185.255.133.25RpC5PqzDnq.exeGet hashmaliciousBrowse
                                                                                                                                              Covid 21.exeGet hashmaliciousBrowse
                                                                                                                                                Covid 21.exeGet hashmaliciousBrowse
                                                                                                                                                  KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                    KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                      IcePick.exeGet hashmaliciousBrowse
                                                                                                                                                        IcePick.exeGet hashmaliciousBrowse
                                                                                                                                                          KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                            No context
                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                            SUPERSERVERSDATACENTERRU8mYX8reBM4.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.32
                                                                                                                                                            SHIPPING DOCUMENTS.xlsxGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.32
                                                                                                                                                            Offer-Far East Contractor Pte Ltd.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.32
                                                                                                                                                            Y.K.K Ltd Offer.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.32
                                                                                                                                                            RpC5PqzDnq.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            Covid 21.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            Covid 21.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            IcePick.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            IcePick.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.255.133.25
                                                                                                                                                            S7r5WgPAkR.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.104.249.209
                                                                                                                                                            IcePick.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.195.26.13
                                                                                                                                                            KRAKEN.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.195.26.13
                                                                                                                                                            iaWw88T5f5.exeGet hashmaliciousBrowse
                                                                                                                                                            • 84.252.74.166
                                                                                                                                                            1eqLoIBRVZ.exeGet hashmaliciousBrowse
                                                                                                                                                            • 84.252.74.166
                                                                                                                                                            xMnk13mIl4.exeGet hashmaliciousBrowse
                                                                                                                                                            • 84.252.74.166
                                                                                                                                                            csrss.exeGet hashmaliciousBrowse
                                                                                                                                                            • 185.217.198.252
                                                                                                                                                            VDI-Qoutation-payment-D210.xlsxGet hashmaliciousBrowse
                                                                                                                                                            • 185.217.198.252
                                                                                                                                                            No context
                                                                                                                                                            No context
                                                                                                                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_IcePick.exe_c1de4ee744d89413c79e26d1a6bdb474353f62f8_643e5221_1a29c897\Report.wer
                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):65536
                                                                                                                                                            Entropy (8bit):0.7976212973280968
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:192:Jgfqrg4r0SaAHZwkyjuq/u7smfS274ItU:6yr9r0SaoZwkyjD/u7smfX4ItU
                                                                                                                                                            MD5:3D66856FE8222A6753CB2968F04C7404
                                                                                                                                                            SHA1:D1B53CB5BC7C1B1B970D0E387DEADFC5BBA92918
                                                                                                                                                            SHA-256:A1BEFDA3C99E0EBD282A61FC787CA3C751B50EFA01BF3AD5545EA0FF4EFD1B43
                                                                                                                                                            SHA-512:517CFF9E6FC3A3655C0AA181AE3250EDA7CF7F11076A17DB387F8EE68B222334BA3F539AC77668892C83D8DA53DB9214FA4691F66F6C12FB3E2C011565545A87
                                                                                                                                                            Malicious:true
                                                                                                                                                            Reputation:low
                                                                                                                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.0.0.6.8.2.2.8.9.3.8.3.4.6.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.0.0.6.8.2.4.1.2.9.7.6.4.3.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.3.8.8.0.e.4.e.-.2.6.9.e.-.4.d.0.3.-.b.a.b.a.-.d.3.c.b.5.f.a.6.b.e.6.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.2.7.1.e.8.e.-.0.4.e.2.-.4.3.2.0.-.8.a.8.c.-.e.d.d.8.2.7.e.c.e.8.7.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.c.e.P.i.c.k...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.6.8.-.0.0.0.1.-.0.0.1.b.-.4.7.b.7.-.c.d.4.d.8.4.c.d.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.f.f.9.2.e.f.9.8.a.d.2.6.3.6.a.6.f.e.3.2.6.9.4.c.e.9.8.8.8.f.7.0.0.0.0.0.9.0.4.!.0.0.0.0.4.a.b.c.f.7.b.1.f.f.b.b.d.9.3.d.a.c.e.4.6.a.7.9.0.d.9.0.0.1.a.8.4.5.1.0.6.5.c.7.!.I.c.e.P.i.c.k...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.
                                                                                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CB7.tmp.dmp
                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            File Type:Mini DuMP crash report, 14 streams, Sat Oct 30 11:50:30 2021, 0x1205a4 type
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):951386
                                                                                                                                                            Entropy (8bit):0.7034972574396345
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:3072:YNgEmP3Zxzavvvvvvvvvvvvvvvvvvvvvv/nFigmg7gLyjAGfmXyvZIpw7cz4/3:Y
                                                                                                                                                            MD5:E7227CCCE36E8F249153AD43C06BED94
                                                                                                                                                            SHA1:16A89C668A6B5086E262749EA08A8D864F989308
                                                                                                                                                            SHA-256:7D16747DBA72E30225B702966E2FE21E734C629D4EDDE733B4CE4AF19092165F
                                                                                                                                                            SHA-512:F3FA282C8F8D329B5E359D362CC9370EF5D8AD137F0E69492358BA5BC8F27148E5BCFED15D7B66C9D3B62FA9422EF93CBE4EDD5CC3B760579809A9BFDDAB88C5
                                                                                                                                                            Malicious:false
                                                                                                                                                            Reputation:low
                                                                                                                                                            Preview: MDMP....... ........1}a........................@................'..........T.......8...........T...........P....o...........................................................................................U...........B..............GenuineIntelW...........T.......h...w1}a.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F46.tmp.WERInternalMetadata.xml
                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):8314
                                                                                                                                                            Entropy (8bit):3.694540026609471
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:192:Rrl7r3GLNiUnX6pU6YrzSUruSgmfE3LVxLiSw+pDb89bLNsfLj5m:RrlsNiUX6q6YfSUruSgmfE3pxOSILGfc
                                                                                                                                                            MD5:15BCC11DDC3B5495B8363AD08BB38008
                                                                                                                                                            SHA1:2C04E77CC2B999DB662D80122F04467BA83AAEE1
                                                                                                                                                            SHA-256:2C5DA7C136577AD6F8E6651CD325B3CD326CA7E4597087216859A500D4861264
                                                                                                                                                            SHA-512:7DEC0911B0E2708D8DF760BE027FD11E69D06FC30267D00A7362C335441B1596C0C88D8C4A5567C1F195157231BA0876DF3865A7857A3B3C8C011E7B34A34587
                                                                                                                                                            Malicious:false
                                                                                                                                                            Reputation:low
                                                                                                                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.7.6.<./.P.i.d.>.......
                                                                                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER361D.tmp.xml
                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):4575
                                                                                                                                                            Entropy (8bit):4.4633229370491065
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:48:cvIwSD8zsNJgtWI9NJWSC8ByL8fm8M4JFNGpeBFtB+q8+tmit0Oh1Fe1ydd:uITfnG4SNsoJFW6BR0fOh181ydd
                                                                                                                                                            MD5:284D980B8DB947A09FD97E8EF1529AAA
                                                                                                                                                            SHA1:C2E31362F9C704E4B5F347DB91A0737E30B3D465
                                                                                                                                                            SHA-256:06AE97F6E88C6DA46E5EF735E88D09A693A9913DFE2D945C6F6BBE7CE95EB2B7
                                                                                                                                                            SHA-512:4C57D185C53E7D7E1E37E06D1209B3911B80C35A3D059F0A0BC121149875B9CDF289695E75952BE9772D780633DF1BA99DED6DA9BF978B3224B862B174F279AE
                                                                                                                                                            Malicious:false
                                                                                                                                                            Reputation:low
                                                                                                                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1232461" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):2291
                                                                                                                                                            Entropy (8bit):5.3192079301865585
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:48:MOfHK5HKXAHKhBHKdHKB1AHKzvQTHmYHKhQnoPtHoxHImHKAHK1HxLHG1qHqH5HX:vq5qXAqLqdqUqzcGYqhQnoPtIxHbqAqG
                                                                                                                                                            MD5:174E563C986AB09114A6F31F870A6E13
                                                                                                                                                            SHA1:F68EFDC04D0559B24C448E629A0115F2E6C3B39D
                                                                                                                                                            SHA-256:465C8001CEFD747AF8A94EDD62CC829D8DFF4D6BED174591DA0B71E10FDC584F
                                                                                                                                                            SHA-512:252A2B615BB7BB4223F0873F41CC7C4BC6576172CD704DD93926E004CD5795CA5DC2DE3332586BF3C44E0B564148A7661563C00B204649C7A5594C097C1E9ECE
                                                                                                                                                            Malicious:false
                                                                                                                                                            Reputation:moderate, very likely benign file
                                                                                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.IdentityModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=
                                                                                                                                                            C:\Windows\appcompat\Programs\Amcache.hve
                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):1572864
                                                                                                                                                            Entropy (8bit):4.243836095032291
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:12288:ba05O8Gv2Iyeyil2a99tHFPTWG8vlxXoDmXGk7L7C6tJX4ST:+05O8Gv2IyDil2k5W
                                                                                                                                                            MD5:4F7F7D2DED7A458FC3CCDB8C7478AB77
                                                                                                                                                            SHA1:EF402E0D3B5BBF199C08294E664B5364FC05B136
                                                                                                                                                            SHA-256:329402792B24FACA496868FE43DACC325667A5936883FAB1E1E0740D0EEB3551
                                                                                                                                                            SHA-512:374C3A057FAE8A51ED2F676141546E36123E0ABE87FCCB6A1D54A35ECF26D97635918B9055CAF86F623B627EFE96BCFD5024E1DAF1B8560A47903C51D021BB34
                                                                                                                                                            Malicious:false
                                                                                                                                                            Reputation:low
                                                                                                                                                            Preview: regfH...H...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.$.T.................................................................................................................................................................................................................................................................................................................................................*..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                            C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                            Category:dropped
                                                                                                                                                            Size (bytes):20480
                                                                                                                                                            Entropy (8bit):3.403374512085946
                                                                                                                                                            Encrypted:false
                                                                                                                                                            SSDEEP:384:U7r5K5uPvQKgnVVeeDzeF1NKZtjtT8G5w41cbDbNDKBw:0VKYg/eeDze/NYtjSG5w4aDBg
                                                                                                                                                            MD5:AA4D293AE7DE17674CF1894131C2A88B
                                                                                                                                                            SHA1:BA4BBEBD4C62E5106BC02ACB68D71D318C5326FF
                                                                                                                                                            SHA-256:74EF86A380E9066DC952F3A8A1064FDA08AA9E3394F8BD45C813AF0679BE4173
                                                                                                                                                            SHA-512:20F295E2D90347E630EDAC55EBCA206C58AD4A1C74B02E11AE0EF910534113AAAF5036733EF2FA187CDA84D502635310BBB68455598F102E390D87BCE5738601
                                                                                                                                                            Malicious:false
                                                                                                                                                            Reputation:low
                                                                                                                                                            Preview: regfG...G...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.$.T.................................................................................................................................................................................................................................................................................................................................................*..HvLE.N......G............P.P..A..9.R........................ ..hbin................p.\..,..........nk,...T.................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ...T........ ........................... .......Z.......................Root........lf......Root....nk ...T.................................... ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...

                                                                                                                                                            Static File Info

                                                                                                                                                            General

                                                                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                            Entropy (8bit):7.949538323269029
                                                                                                                                                            TrID:
                                                                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                            File name:IcePick.exe
                                                                                                                                                            File size:1638856
                                                                                                                                                            MD5:8d8cf0304728ca81818a868f1f06224d
                                                                                                                                                            SHA1:4abcf7b1ffbbd93dace46a790d9001a8451065c7
                                                                                                                                                            SHA256:8b10986bf59cc6c50698fd9a3de7522cc0767da1655f4c5c51601187eebbdac8
                                                                                                                                                            SHA512:d6ef1c04df11e9e34283104f6ebf3ef39d5a4e7d80b69994b5d0a01e4e912b7936d2e3f47d604626ab77a73c53cca74f8a4421c4d3e2151440de7d7107a5cdcb
                                                                                                                                                            SSDEEP:49152:OeaIpPJehpyHGIlgeVWMBw5QpTJI0q+v/8:x0WGQTVZMQFbq+H8
                                                                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*(.$nI.wnI.wnI.wz".vcI.wz".v.I.wz".vxI.w<<.v.I.w<<.vzI.w<<.v$I.wz".vkI.wnI.w2I.w.<.voI.w.<.woI.w.<.voI.wRichnI.w...............

                                                                                                                                                            File Icon

                                                                                                                                                            Icon Hash:00828e8e8686b000

                                                                                                                                                            General

                                                                                                                                                            Entrypoint:0x779058
                                                                                                                                                            Entrypoint Section:.boot
                                                                                                                                                            Digitally signed:true
                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                            Subsystem:windows gui
                                                                                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE
                                                                                                                                                            Time Stamp:0x617BD626 [Fri Oct 29 11:08:22 2021 UTC]
                                                                                                                                                            TLS Callbacks:
                                                                                                                                                            CLR (.Net) Version:
                                                                                                                                                            OS Version Major:6
                                                                                                                                                            OS Version Minor:0
                                                                                                                                                            File Version Major:6
                                                                                                                                                            File Version Minor:0
                                                                                                                                                            Subsystem Version Major:6
                                                                                                                                                            Subsystem Version Minor:0
                                                                                                                                                            Import Hash:94e2b0572ac9e87d08b3c525a2cff4f7
                                                                                                                                                            Signature Valid:false
                                                                                                                                                            Signature Issuer:CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
                                                                                                                                                            Signature Validation Error:The digital signature of the object did not verify
                                                                                                                                                            Error Number:-2146869232
                                                                                                                                                            Not Before, Not After
                                                                                                                                                            • 4/24/2020 2:00:00 AM 8/24/2022 2:00:00 PM
                                                                                                                                                            Subject Chain
                                                                                                                                                            • CN="Brave Software, Inc.", OU=Brave Software, O="Brave Software, Inc.", L=San Francisco, S=California, C=US
                                                                                                                                                            Version:3
                                                                                                                                                            Thumbprint MD5:DF7F026B231922A48A81D51E9440B52C
                                                                                                                                                            Thumbprint SHA-1:D334E2958870E80939709789B04F01F23100358A
                                                                                                                                                            Thumbprint SHA-256:1CF4877D61313C8A5A2B3705DAEE977D85E1E1B8DCE19B4A049DB7903DF544C8
                                                                                                                                                            Serial:05488AD7E4BABA7F93E3323C0573BF3C
                                                                                                                                                            Instruction
                                                                                                                                                            call 00007F19B490D8D0h
                                                                                                                                                            push ebx
                                                                                                                                                            mov ebx, esp
                                                                                                                                                            push ebx
                                                                                                                                                            mov esi, dword ptr [ebx+08h]
                                                                                                                                                            mov edi, dword ptr [ebx+10h]
                                                                                                                                                            cld
                                                                                                                                                            mov dl, 80h
                                                                                                                                                            mov al, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            mov byte ptr [edi], al
                                                                                                                                                            inc edi
                                                                                                                                                            mov ebx, 00000002h
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            jnc 00007F19B490D76Ch
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            jnc 00007F19B490D7D3h
                                                                                                                                                            xor eax, eax
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            jnc 00007F19B490D867h
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            adc eax, eax
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            adc eax, eax
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            adc eax, eax
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            adc eax, eax
                                                                                                                                                            je 00007F19B490D78Ah
                                                                                                                                                            push edi
                                                                                                                                                            mov eax, eax
                                                                                                                                                            sub edi, eax
                                                                                                                                                            mov al, byte ptr [edi]
                                                                                                                                                            pop edi
                                                                                                                                                            mov byte ptr [edi], al
                                                                                                                                                            inc edi
                                                                                                                                                            mov ebx, 00000002h
                                                                                                                                                            jmp 00007F19B490D71Bh
                                                                                                                                                            mov eax, 00000001h
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            adc eax, eax
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            jc 00007F19B490D76Ch
                                                                                                                                                            sub eax, ebx
                                                                                                                                                            mov ebx, 00000001h
                                                                                                                                                            jne 00007F19B490D7AAh
                                                                                                                                                            mov ecx, 00000001h
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            adc ecx, ecx
                                                                                                                                                            add dl, dl
                                                                                                                                                            jne 00007F19B490D787h
                                                                                                                                                            mov dl, byte ptr [esi]
                                                                                                                                                            inc esi
                                                                                                                                                            adc dl, dl
                                                                                                                                                            jc 00007F19B490D76Ch
                                                                                                                                                            push esi
                                                                                                                                                            mov esi, edi
                                                                                                                                                            sub esi, ebp
                                                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x570380x50.idata
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x53d.rsrc
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x18e8000x19c8.B1uj23u
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x520000x1c.debug
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                            0x10000x21f520x11800False0.997502790179data7.99432997785IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                                            0x230000xc360x800False0.828125data6.97723011536IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                                            0x240000xea260x6000False0.9970703125data7.99036677624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                            0x330000x1cf80x400False0.9970703125data7.50999636714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                            0x350000x1a2fd0x12600False0.99876434949data7.99662164648IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                            0x500000x1c580x1600False0.963600852273data7.79673503105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                            .debug0x520000x10000x400False0.419921875data3.88049989161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                            .B1uj23u0x530000x40000x4000False0.06982421875data1.27146380655IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                            .idata0x570000x10000x200False0.16015625data1.12725262327IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                            .rsrc0x580000x53d0x600False0.41015625data3.85921143771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                            .B1uj23u0x590000x3200000x0unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                                            .boot0x3790000x15d8000x15d800False0.994269156831data7.96273504967IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                                            NameRVASizeTypeLanguageCountry
                                                                                                                                                            RT_VERSION0x580a00x320dataEnglishUnited States
                                                                                                                                                            RT_MANIFEST0x583c00x17dXML 1.0 document textEnglishUnited States
                                                                                                                                                            DLLImport
                                                                                                                                                            kernel32.dllGetModuleHandleA
                                                                                                                                                            USER32.dllShowWindow
                                                                                                                                                            DescriptionData
                                                                                                                                                            LegalCopyright(C) 2017-2021 NVIDIA Corporation. All rights reserved.
                                                                                                                                                            InternalNameNVIDIA Notification
                                                                                                                                                            FileVersion73.3683.1933.5
                                                                                                                                                            CompanyNameNVIDIA Corporation
                                                                                                                                                            ProductNameNVIDIA Notification
                                                                                                                                                            ProductVersionrel_03_23/6986037
                                                                                                                                                            FileDescriptionNVIDIA Notification
                                                                                                                                                            Translation0x0409 0x04e4
                                                                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                                                                            EnglishUnited States

                                                                                                                                                            Network Behavior

                                                                                                                                                            Download Network PCAP: filteredfull

                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                            Oct 30, 2021 13:50:36.355925083 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:36.408231020 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:36.408338070 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:36.707842112 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:36.760883093 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:36.771183968 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:36.818032980 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:37.748162985 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:37.800234079 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:37.811522007 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:37.865081072 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:44.554811954 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:44.606868982 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:44.619335890 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:44.619400024 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:44.619632006 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:44.671968937 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:44.724869967 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:49.132200956 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:49.196230888 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:49.241008043 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:49.268100977 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:49.320350885 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:49.320532084 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:49.342257023 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:49.397212982 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:49.690670013 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:49.764156103 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:49.819084883 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:50.356863976 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:50.420284033 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:50.422058105 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:50.485132933 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:50.539252996 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.526272058 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.579090118 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.579128027 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.579256058 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.579284906 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.579338074 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.579387903 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.632647038 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.632693052 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.632730007 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.632782936 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.632843018 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.632949114 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.633024931 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.633066893 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.633104086 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.633155107 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.633227110 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.633266926 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.674643993 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.677047014 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.685482979 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.685522079 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.685611010 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.685682058 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.685817003 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.686007023 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686073065 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686147928 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.686178923 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.686214924 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.686280966 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686307907 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686330080 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686532021 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.686558962 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.686614990 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686649084 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.686711073 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690422058 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690454960 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690474033 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690500021 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690526009 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690562963 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690594912 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.690622091 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.729645967 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.730439901 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.730575085 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.738718033 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.738735914 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.738744020 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.738749981 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.738948107 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.739128113 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.739411116 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.739543915 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.739684105 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.739717960 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.739943981 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.740211010 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.740283966 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.740381956 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.740495920 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.740766048 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.740809917 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.741035938 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.741113901 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.741682053 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.741765976 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.782757044 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.782773018 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.782903910 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.783003092 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.783183098 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.783570051 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.783680916 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.783849955 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.784085989 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.784303904 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.784569025 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.784769058 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.785046101 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.785201073 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.785238981 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.785620928 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.785681963 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.794117928 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.794133902 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.794142962 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.794168949 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.794328928 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.794935942 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.795347929 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.795778990 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.796226025 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.796389103 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.796777010 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.796857119 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.837822914 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.837860107 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.837935925 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.838457108 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.838808060 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.839329958 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.840133905 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.842708111 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.843403101 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.843537092 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.849121094 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.849153042 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.849690914 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.849978924 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.850517035 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.850985050 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.851255894 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.851622105 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.852166891 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.852276087 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.895817041 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.895926952 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900618076 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900651932 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900676012 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900702000 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900727987 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900763035 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900799990 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900835991 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900897980 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900937080 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900965929 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.900990009 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.901016951 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.901052952 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.901084900 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.901110888 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.901135921 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.901782990 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.901916981 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.904414892 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.904489994 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.904515028 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.904697895 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.904726982 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.905015945 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.905147076 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.905332088 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.905464888 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.905628920 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.906692028 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.906874895 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.908549070 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.909135103 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.909259081 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.954152107 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.954185963 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.954436064 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.954608917 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.954706907 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.954983950 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.955082893 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.955310106 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.955591917 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.955822945 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.956124067 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.956176043 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.957289934 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.957971096 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.958086014 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:52.961381912 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.961503029 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.961659908 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.961901903 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.962057114 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.962254047 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.962548971 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.962738037 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.963191986 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.963381052 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.963788986 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.964065075 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:52.964576960 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.010310888 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.010432005 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.011151075 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.011318922 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.012022018 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.012279034 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.012523890 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.012634993 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.012835979 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.013075113 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.016894102 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.016918898 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.017134905 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.017216921 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.017479897 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.017716885 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.018079042 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.018289089 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.018510103 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.035398006 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.058013916 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.110443115 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.121387959 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.144501925 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.196770906 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.207768917 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.257198095 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.329729080 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.382078886 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.403955936 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.444406033 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.552022934 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.616029024 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.631254911 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.694571972 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.741772890 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.805128098 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.835355997 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.901798010 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:53.944504976 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:53.997803926 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:54.061229944 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:54.116328955 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:55.286637068 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:55.350563049 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:55.351457119 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:55.414840937 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:55.417346001 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:55.482584953 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:55.523827076 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:55.652718067 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:55.716197968 CEST1822549772185.255.133.25192.168.2.4
                                                                                                                                                            Oct 30, 2021 13:50:55.757630110 CEST4977218225192.168.2.4185.255.133.25
                                                                                                                                                            Oct 30, 2021 13:50:56.030843973 CEST4977218225192.168.2.4185.255.133.25

                                                                                                                                                            Code Manipulations

                                                                                                                                                            Statistics

                                                                                                                                                            CPU Usage

                                                                                                                                                            050100s020406080100

                                                                                                                                                            Click to jump to process

                                                                                                                                                            Memory Usage

                                                                                                                                                            050100s0.002040MB

                                                                                                                                                            Click to jump to process

                                                                                                                                                            High Level Behavior Distribution

                                                                                                                                                            • File
                                                                                                                                                            • Registry
                                                                                                                                                            • Network

                                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                                            Behavior

                                                                                                                                                            Click to jump to process

                                                                                                                                                            System Behavior

                                                                                                                                                            Start time:13:50:15
                                                                                                                                                            Start date:30/10/2021
                                                                                                                                                            Path:C:\Users\user\Desktop\IcePick.exe
                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                            Commandline:'C:\Users\user\Desktop\IcePick.exe'
                                                                                                                                                            Imagebase:0xf00000
                                                                                                                                                            File size:1638856 bytes
                                                                                                                                                            MD5 hash:8D8CF0304728CA81818A868F1F06224D
                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                            Yara matches:
                                                                                                                                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.695430089.0000000000782000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.746024752.0000000000462000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.698153396.0000000000462000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.700451355.0000000000462000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                            Reputation:low
                                                                                                                                                            Start time:13:50:20
                                                                                                                                                            Start date:30/10/2021
                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                            Imagebase:0x9c0000
                                                                                                                                                            File size:98912 bytes
                                                                                                                                                            MD5 hash:6807F903AC06FF7E1670181378690B22
                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                                                                            Yara matches:
                                                                                                                                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.769470353.0000000000402000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                                                                            Reputation:moderate
                                                                                                                                                            Start time:13:50:25
                                                                                                                                                            Start date:30/10/2021
                                                                                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 548
                                                                                                                                                            Imagebase:0x1270000
                                                                                                                                                            File size:434592 bytes
                                                                                                                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                            Reputation:high

                                                                                                                                                            Disassembly

                                                                                                                                                            Code Analysis

                                                                                                                                                            Executed Functions

                                                                                                                                                            APIs
                                                                                                                                                            • Sleep.KERNELBASE(-3A85E6B9), ref: 011FFDF0
                                                                                                                                                            • FindWindowA.USER32 ref: 0120068D
                                                                                                                                                            • Sleep.KERNELBASE(?,00000000), ref: 012008DC
                                                                                                                                                            • FindWindowA.USER32(00000000,?,?,?,?,00000000), ref: 0120119C
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.747459786.000000000111B000.00000040.00020000.sdmp, Offset: 00F00000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.746420187.0000000000F00000.00000002.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746436517.0000000000F01000.00000020.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746491860.0000000000F24000.00000002.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746532762.0000000000F33000.00000004.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746565697.0000000000F35000.00000002.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746608504.0000000000F53000.00000004.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746638366.0000000000F58000.00000002.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746653548.0000000000F59000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746882475.0000000001098000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746931589.000000000109A000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.746974139.000000000109C000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747025979.000000000109E000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747072603.00000000010A0000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747087971.00000000010A2000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747113737.00000000010A4000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747127358.00000000010A6000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747143735.00000000010A8000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747161975.00000000010AA000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747226130.00000000010D5000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747242181.00000000010D7000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747266614.00000000010D9000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747290658.00000000010DB000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747310627.00000000010DD000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747327258.00000000010DF000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747359879.00000000010E1000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747376957.00000000010E3000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747393631.00000000010E5000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747406048.00000000010E7000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747418028.00000000010E9000.00000040.00020000.sdmp Download File
                                                                                                                                                            • Associated: 00000000.00000002.747753870.0000000001279000.00000020.00020000.sdmp Download File
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: FindSleepWindow
                                                                                                                                                            • String ID: @{Md$LASS$monc$oncl
                                                                                                                                                            • API String ID: 3078808852-172041215
                                                                                                                                                            • Opcode ID: 066a2d118c0a24a0c99b4fce61db407bf4eb76c3f237d71b85cdf73bc76387ba
                                                                                                                                                            • Instruction ID: 41107a9b86cd7eb3ee105b760cd9be5b2c94ba39713981d1efc6237b8e10533b
                                                                                                                                                            • Opcode Fuzzy Hash: 066a2d118c0a24a0c99b4fce61db407bf4eb76c3f237d71b85cdf73bc76387ba
                                                                                                                                                            • Instruction Fuzzy Hash: 7152C3B253C600DFE306AF09EC8677AFBE4EF54310F064A2EE7C683681D67559508A97
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Non-executed Functions

                                                                                                                                                            Executed Functions

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-1199382977
                                                                                                                                                            • Opcode ID: 424ae29fd7434d27ea047c39585c8282ee84fd2de5dd1958ed5a4d40f56dfc46
                                                                                                                                                            • Instruction ID: 38481dfe79dcc656f9408ca25040cbb44666e0a970c58cf96ca12c08f32ba81b
                                                                                                                                                            • Opcode Fuzzy Hash: 424ae29fd7434d27ea047c39585c8282ee84fd2de5dd1958ed5a4d40f56dfc46
                                                                                                                                                            • Instruction Fuzzy Hash: 53D1A034B002159FCB14DBB9D454A6EBBFAEF89314B1584A9E506DB391EF31DC01CBA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            APIs
                                                                                                                                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0A15513D
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.776682034.000000000A150000.00000040.00000001.sdmp, Offset: 0A150000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CryptDataUnprotect
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 834300711-0
                                                                                                                                                            • Opcode ID: 72f4e797cb113f8b166fe15701b8d5c05bf03cab01ae69e01371d303c8df89a2
                                                                                                                                                            • Instruction ID: baec8b817e42c524af3a198016857ac54537ed194d8bc07cb3de4e19d47142ea
                                                                                                                                                            • Opcode Fuzzy Hash: 72f4e797cb113f8b166fe15701b8d5c05bf03cab01ae69e01371d303c8df89a2
                                                                                                                                                            • Instruction Fuzzy Hash: 31215672800249DFDB10CF99C844BEEBFF4EF49324F188459E964AB211C739A955CFA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            APIs
                                                                                                                                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0A15513D
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.776682034.000000000A150000.00000040.00000001.sdmp, Offset: 0A150000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CryptDataUnprotect
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 834300711-0
                                                                                                                                                            • Opcode ID: cac441e5066e5afd7390309d3462600e24c3ad1d8c79bbffe3079a27c3258776
                                                                                                                                                            • Instruction ID: fea12c18ff80c85a1868334d9615efa4290d1f508783b6096b83c8d7bad7db30
                                                                                                                                                            • Opcode Fuzzy Hash: cac441e5066e5afd7390309d3462600e24c3ad1d8c79bbffe3079a27c3258776
                                                                                                                                                            • Instruction Fuzzy Hash: ED113476800209DFCB10CF99D944BEEBFF5EF48324F158419EA25A7200C739A954DFA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: n-core-largeinteger-l1-1-0$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-4217813933
                                                                                                                                                            • Opcode ID: 8018b61d27627ee04cbcfe440bb2e584ca12e41439b9ad99cc3ae281c0e44d8e
                                                                                                                                                            • Instruction ID: cb2abc23dd4e69724b35f70bc83b56eaca195cf5e5cbd9b2e875b743dc8f2950
                                                                                                                                                            • Opcode Fuzzy Hash: 8018b61d27627ee04cbcfe440bb2e584ca12e41439b9ad99cc3ae281c0e44d8e
                                                                                                                                                            • Instruction Fuzzy Hash: 0C61D031B005209FDF15EBB8D05556F7BBBEBC5311B218429E946DB382DF399C428BA2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-950928858
                                                                                                                                                            • Opcode ID: c9a7ae20633bff0123d8f80b36d72f4d9dff381841e5fd59ea5cc085c776e420
                                                                                                                                                            • Instruction ID: 79a05d95f14870ff27067fd59f26bc5e7fe949c5abf0582082f3642114cfe9b1
                                                                                                                                                            • Opcode Fuzzy Hash: c9a7ae20633bff0123d8f80b36d72f4d9dff381841e5fd59ea5cc085c776e420
                                                                                                                                                            • Instruction Fuzzy Hash: 2EE18E747002149FDB14DF78C8A5A6ABBFAEF89310F158469E906CB3A2DB34DC45CB91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: <VRk$n-gdi-devcaps-l1-1-0
                                                                                                                                                            • API String ID: 0-1950289282
                                                                                                                                                            • Opcode ID: 57ea95e9e6625c08f88a11e265ce3de61a08ca25defe3da0baa1a276537f4403
                                                                                                                                                            • Instruction ID: 4d0a3502aa116c1cc342696143b1486160ec73495fb349abb2df0dbea5198a25
                                                                                                                                                            • Opcode Fuzzy Hash: 57ea95e9e6625c08f88a11e265ce3de61a08ca25defe3da0baa1a276537f4403
                                                                                                                                                            • Instruction Fuzzy Hash: 30131D34A41214DFDB1A9F30D452A99B73AFF89346B1085AADE5136B52CB3FD942DF00
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: <VRk$n-gdi-devcaps-l1-1-0
                                                                                                                                                            • API String ID: 0-1950289282
                                                                                                                                                            • Opcode ID: 6b1b8192e8c36a3979d743fe41046c762b0f9dab16b933922d89f76a8733ea64
                                                                                                                                                            • Instruction ID: 5e6dc2b1f5ba4f3eb11ca6d1ee0ef79f8cd3e55777f8e99992f94bd38d34eddb
                                                                                                                                                            • Opcode Fuzzy Hash: 6b1b8192e8c36a3979d743fe41046c762b0f9dab16b933922d89f76a8733ea64
                                                                                                                                                            • Instruction Fuzzy Hash: F8131D34A01214DFDB1A9F70D452A99B73AFF8934AB1085AADE5136B52CB3FD942DF00
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 0Yc$`Tc$sam^
                                                                                                                                                            • API String ID: 0-1330092401
                                                                                                                                                            • Opcode ID: 85a8d1904e42328484b468cac7cdecaa6bd9abda5c3d813abd249d8090f751f9
                                                                                                                                                            • Instruction ID: b44b3682f2b94ced2cb50098d66c1adf4c037445da5bda4bdd04248f581ac4e4
                                                                                                                                                            • Opcode Fuzzy Hash: 85a8d1904e42328484b468cac7cdecaa6bd9abda5c3d813abd249d8090f751f9
                                                                                                                                                            • Instruction Fuzzy Hash: 54E17D32600625DFDF159FA5C900EA97BB7FF88300F0644A8E60A9B272DB32D955DF91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 0Yc$`Tc$sam^
                                                                                                                                                            • API String ID: 0-1330092401
                                                                                                                                                            • Opcode ID: 069b86f786ee9d5750bbbf51c8048031bdf1e107842372fe9664410012fab87a
                                                                                                                                                            • Instruction ID: 4fdcf66b9ef2bb8cc94376226a6de71302b1e027ea3212ca5b03b5f820c7b16b
                                                                                                                                                            • Opcode Fuzzy Hash: 069b86f786ee9d5750bbbf51c8048031bdf1e107842372fe9664410012fab87a
                                                                                                                                                            • Instruction Fuzzy Hash: 79D17031600225DFDF169FA5C944EA97BB7FF88300F0641A8E60A9B272DB32D955DF90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-560258030
                                                                                                                                                            • Opcode ID: 23b0db7f181438793d36a6451f2626ee431b2c622a6250265e4e4c0f8edfc089
                                                                                                                                                            • Instruction ID: 39e577569ce6e23aae0a3a39e45726528e2595d07edf7eccfe1aff416c64a88a
                                                                                                                                                            • Opcode Fuzzy Hash: 23b0db7f181438793d36a6451f2626ee431b2c622a6250265e4e4c0f8edfc089
                                                                                                                                                            • Instruction Fuzzy Hash: 5E412731309254AFCB159BB89C04A5ABF66DBC7325F2486AAF514CB3D2CE318D12C7A1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: ,~>i$pfc
                                                                                                                                                            • API String ID: 0-1094966301
                                                                                                                                                            • Opcode ID: 216f9179d5a370d3cd222e0376130081639d6ab1f3229b0fcc1333ebd1237da8
                                                                                                                                                            • Instruction ID: 87e4816801085cf72042a1719c4a8d5c3136bf850f0afd8ad5e4afba727848d3
                                                                                                                                                            • Opcode Fuzzy Hash: 216f9179d5a370d3cd222e0376130081639d6ab1f3229b0fcc1333ebd1237da8
                                                                                                                                                            • Instruction Fuzzy Hash: 54E14C34A00215DFCB14DFA9D994A9DBBB2FF88314F158828E9169B361DB70EC45CF91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc
                                                                                                                                                            • API String ID: 0-3984999029
                                                                                                                                                            • Opcode ID: fe5b24d8b76c2a78c14f2ada4ec991c102613f4a7fc7d7a7b8dd7daa186fca97
                                                                                                                                                            • Instruction ID: 9b1c0070d461c9846d820e3441509f2fd8b63c0dae57b9502c59a166bbc330b3
                                                                                                                                                            • Opcode Fuzzy Hash: fe5b24d8b76c2a78c14f2ada4ec991c102613f4a7fc7d7a7b8dd7daa186fca97
                                                                                                                                                            • Instruction Fuzzy Hash: 38718D70E002198FDB14DFA8C4546AEBBF7AF89304F25852DE809EB395DB709C46CB91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc
                                                                                                                                                            • API String ID: 0-3984999029
                                                                                                                                                            • Opcode ID: b3e6e30c69459d154078953030ddbc94fd8643cd7fe8a7a7725715a82eab385f
                                                                                                                                                            • Instruction ID: 799c7010038793152c88acc8e1aa694ad33d4d2cf6d7dc4a21e805d7476fde62
                                                                                                                                                            • Opcode Fuzzy Hash: b3e6e30c69459d154078953030ddbc94fd8643cd7fe8a7a7725715a82eab385f
                                                                                                                                                            • Instruction Fuzzy Hash: BA41AE303186158FCB21DF78D444A5AB7EAEF85304B148969D54ACB356DF38EC46CBA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc
                                                                                                                                                            • API String ID: 0-3984999029
                                                                                                                                                            • Opcode ID: 810d6762ac73fcf74462053ff3a4725a607169c52dd4fb007d232fedc8865c7d
                                                                                                                                                            • Instruction ID: bd1fe4ba9a2803a28b953a1860172cacfc5fc3bccf32953e9e41535d4441ff5d
                                                                                                                                                            • Opcode Fuzzy Hash: 810d6762ac73fcf74462053ff3a4725a607169c52dd4fb007d232fedc8865c7d
                                                                                                                                                            • Instruction Fuzzy Hash: 55414834709350DFCB069B78E4145AABBBAEF8631571448BED949C7382EF348C16CBA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc
                                                                                                                                                            • API String ID: 0-3984999029
                                                                                                                                                            • Opcode ID: 4bb1f7bfed394758a34cbda430232e5aa84c5c327d0762511b22a487daf60e22
                                                                                                                                                            • Instruction ID: 3958a8fe9f1ccacc2779cde037d2d6c0d0edc9335718c3c49ad6990a4e14188d
                                                                                                                                                            • Opcode Fuzzy Hash: 4bb1f7bfed394758a34cbda430232e5aa84c5c327d0762511b22a487daf60e22
                                                                                                                                                            • Instruction Fuzzy Hash: B521F3307083209FCB15A7B9A41812EBAEBCFC62157158C7ED50ACB791EF74DC0687A2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            APIs
                                                                                                                                                            • LoadLibraryW.KERNELBASE(00000000), ref: 09F7F6A6
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.776360704.0000000009F70000.00000040.00000001.sdmp, Offset: 09F70000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: LibraryLoad
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1029625771-0
                                                                                                                                                            • Opcode ID: 23b607e1285c53fae8dbf84eae1faafc8ab841736d6ab7a34085f7c08550abbf
                                                                                                                                                            • Instruction ID: a52336c85576001ba7a034ddb35319bc20de15adee6918fb34591907804b0802
                                                                                                                                                            • Opcode Fuzzy Hash: 23b607e1285c53fae8dbf84eae1faafc8ab841736d6ab7a34085f7c08550abbf
                                                                                                                                                            • Instruction Fuzzy Hash: 651134B6D002498FCB10CFAAC844ADEFBF4AF89314F14841AD469BB310C775A945CFA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            APIs
                                                                                                                                                            • LoadLibraryW.KERNELBASE(00000000), ref: 09F7F6A6
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.776360704.0000000009F70000.00000040.00000001.sdmp, Offset: 09F70000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: LibraryLoad
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1029625771-0
                                                                                                                                                            • Opcode ID: b4dac360758ff8c82d4601cd50274993493f4311aa61589ca1b44b276726dd3a
                                                                                                                                                            • Instruction ID: 2a2043a3e0a97fac82fcc92f4f915338a5250224d647f830951b88efca65cd9f
                                                                                                                                                            • Opcode Fuzzy Hash: b4dac360758ff8c82d4601cd50274993493f4311aa61589ca1b44b276726dd3a
                                                                                                                                                            • Instruction Fuzzy Hash: 6D1104B5D003498FCB10CFAAC844ADEFBF4AF89224F15841AD429B7310D774A945CFA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc
                                                                                                                                                            • API String ID: 0-1286360449
                                                                                                                                                            • Opcode ID: 66dfaaccc3229a5512dceb23ed4ce5cd6853638c2cf8be8e6d97450244b9f8d6
                                                                                                                                                            • Instruction ID: 804b52550a48d7b6d6c790c6aecff70dd565a3295bf75d7718cf768485b67b66
                                                                                                                                                            • Opcode Fuzzy Hash: 66dfaaccc3229a5512dceb23ed4ce5cd6853638c2cf8be8e6d97450244b9f8d6
                                                                                                                                                            • Instruction Fuzzy Hash: 3C41AD30605245DFDF11DF68C865A6ABBB9EF86300F1484BAE905CB3A2DB31DD41CBA0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc
                                                                                                                                                            • API String ID: 0-1286360449
                                                                                                                                                            • Opcode ID: 35a606b43f38f016fbd2c142093b45dbd546000d36957f56608896b00cd003ea
                                                                                                                                                            • Instruction ID: 21a0c49f659e9236aa3427cd47b38d4a97a16181b55b10bd9da09cd21e8e4c55
                                                                                                                                                            • Opcode Fuzzy Hash: 35a606b43f38f016fbd2c142093b45dbd546000d36957f56608896b00cd003ea
                                                                                                                                                            • Instruction Fuzzy Hash: 1141EF70B052448FDB04DBA8D49476EFBBAEF89310F2484AED509DB382DB358C41CB91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc
                                                                                                                                                            • API String ID: 0-1286360449
                                                                                                                                                            • Opcode ID: 2fc19da2a7c7b6f5e7f0e6587f6f6b29631dde2254a669bdff48d1fe114a9852
                                                                                                                                                            • Instruction ID: c2fdc41b4f40bb67d65591255da8b56ed984a8378d551ec8ea68285bad4dc5ca
                                                                                                                                                            • Opcode Fuzzy Hash: 2fc19da2a7c7b6f5e7f0e6587f6f6b29631dde2254a669bdff48d1fe114a9852
                                                                                                                                                            • Instruction Fuzzy Hash: 75313B347042048FDB18DFA8D4A8AAEBBB6EF89714F1444ACE906DB3A1CF359D41CB50
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc
                                                                                                                                                            • API String ID: 0-1286360449
                                                                                                                                                            • Opcode ID: a706208a9dcd17904d75734a48364e0a3693ac628aa31144875fbabb89395395
                                                                                                                                                            • Instruction ID: e6963baf20fdfc3432f9346acb212eb38ea16720f8ad34a5bf6359cb6e970522
                                                                                                                                                            • Opcode Fuzzy Hash: a706208a9dcd17904d75734a48364e0a3693ac628aa31144875fbabb89395395
                                                                                                                                                            • Instruction Fuzzy Hash: 082124327002149FCB009BB9E4447AEBBAAEB84765F15C43DE509C7740CB34EC518BA0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc
                                                                                                                                                            • API String ID: 0-1286360449
                                                                                                                                                            • Opcode ID: a75ab190bf484fcc25b8037869ef9a7e45c560a9828cd99eb8e0397435e64397
                                                                                                                                                            • Instruction ID: 7571a0ce8e917a4edbed8f08958387630d0000dd01d25b8aa23558134278665d
                                                                                                                                                            • Opcode Fuzzy Hash: a75ab190bf484fcc25b8037869ef9a7e45c560a9828cd99eb8e0397435e64397
                                                                                                                                                            • Instruction Fuzzy Hash: 1011B230B44210AFDB16AB78981576E7BB6DF86700F5180A9E505CF3D1DF348D05CBA2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: Dcc
                                                                                                                                                            • API String ID: 0-314176648
                                                                                                                                                            • Opcode ID: d710d6f368bbf9f5e00b9de964bebda81e1b626bdda5d9fa9c989ec4a971bb51
                                                                                                                                                            • Instruction ID: 55391e8d152ed4a0b30ef3b463f5e9f160b03dd58b28a92a500ca7c8412dc435
                                                                                                                                                            • Opcode Fuzzy Hash: d710d6f368bbf9f5e00b9de964bebda81e1b626bdda5d9fa9c989ec4a971bb51
                                                                                                                                                            • Instruction Fuzzy Hash: C0D05E70A0021CFFCB40DFA8E94259DBBFAEB44304B1089ACE508E7351EB316F009BA4
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 5d1469ec4fd39465c93de21a6bf7c7a6d6f6c110ba5587d64659e3e00cd58f4d
                                                                                                                                                            • Instruction ID: 8937554a4c5fab436963d5b0a87c883e436cc7a215da76516cb5c1fb8df5b0f2
                                                                                                                                                            • Opcode Fuzzy Hash: 5d1469ec4fd39465c93de21a6bf7c7a6d6f6c110ba5587d64659e3e00cd58f4d
                                                                                                                                                            • Instruction Fuzzy Hash: 4251E934A01219EFDF14DFA8E895AEDBBB6FF89705F148029E902A7360DB349D41CB51
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 05efa98ab90caa0e782a4e46ac24100085124ec9dbd1d4b4ff8a58bd0312a450
                                                                                                                                                            • Instruction ID: abc575b7e6d5f0ccfbcce3fa1843e44a07d793bb6ecbb9f75adc36b9a0345e8e
                                                                                                                                                            • Opcode Fuzzy Hash: 05efa98ab90caa0e782a4e46ac24100085124ec9dbd1d4b4ff8a58bd0312a450
                                                                                                                                                            • Instruction Fuzzy Hash: 7151C438A00219DFDB14DFA8D994A9DBBB2FF88314F198458E915AB361DB31EC42CF50
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 28685877a704fb24826f8fbd0b71139802139f953521e3bed52b7a258756d9ca
                                                                                                                                                            • Instruction ID: 8410066e1b931c0773f198fdf26e2c9e5a117031078b6fea2716004c66a7830e
                                                                                                                                                            • Opcode Fuzzy Hash: 28685877a704fb24826f8fbd0b71139802139f953521e3bed52b7a258756d9ca
                                                                                                                                                            • Instruction Fuzzy Hash: CB41D230B105048BC704BFB8E5580ADBBB6FFC9310B544A1DD462A77D5EF30A9598BA2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 6aa1aa536feb0110d772b11fa7d4cf82262a98cd0b1f8702037fb1fe66f7d147
                                                                                                                                                            • Instruction ID: 7ef48a02580b5a6a597704977f3546fa8c7d87be9e565682d64b3bead92b337d
                                                                                                                                                            • Opcode Fuzzy Hash: 6aa1aa536feb0110d772b11fa7d4cf82262a98cd0b1f8702037fb1fe66f7d147
                                                                                                                                                            • Instruction Fuzzy Hash: 19418E34B002208FC749AF78E45856EB7E7EFC8311714896DEA0AD7342DF399D168BA5
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 47e0dc28d0986383d2d11d9107a7ad9b201f37bf4392472b6ef4f3847c16921a
                                                                                                                                                            • Instruction ID: 066396fd117ea5c2b5781dfbf195368141753835642921c24cda79e4957ee99e
                                                                                                                                                            • Opcode Fuzzy Hash: 47e0dc28d0986383d2d11d9107a7ad9b201f37bf4392472b6ef4f3847c16921a
                                                                                                                                                            • Instruction Fuzzy Hash: 35317E34B001208FC748AF78E45856EB7E7EBC83117148A6DEA0AD7342DF399D168BA5
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 2328e252f79400a1fcd3893718bbe069c0ab7ca68f27d7d5f71fec3527a9f0c7
                                                                                                                                                            • Instruction ID: 3d4ce302dc0594a6243960f5dc0b7f874dbe984412ab9dc36575bc6968342d0d
                                                                                                                                                            • Opcode Fuzzy Hash: 2328e252f79400a1fcd3893718bbe069c0ab7ca68f27d7d5f71fec3527a9f0c7
                                                                                                                                                            • Instruction Fuzzy Hash: A0415E35A00129EFDF01DFE4E84589DBFBAFB88301F108519E611A7322DB3A5924DF60
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 3df6fc2b1994bf96b40222439b33d056efebe305e69c2f82c4133b0a09193f4f
                                                                                                                                                            • Instruction ID: 876302233daed2cd0d36d4901cbafe30cff99a3bcf6c8338a4ad924799bc847f
                                                                                                                                                            • Opcode Fuzzy Hash: 3df6fc2b1994bf96b40222439b33d056efebe305e69c2f82c4133b0a09193f4f
                                                                                                                                                            • Instruction Fuzzy Hash: CE31E330E04756CFCB02AF78D8151AAB7B5FF86300B14866ED555E7382EF38A945CBA0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e7793d6e8351fa47246bf96d055ce45d569b58fdecc5d0c94b34316d9c61b0d7
                                                                                                                                                            • Instruction ID: 61058377c60095e7face16ebdabde8dbf7463b3492147e742c0161180138dd07
                                                                                                                                                            • Opcode Fuzzy Hash: e7793d6e8351fa47246bf96d055ce45d569b58fdecc5d0c94b34316d9c61b0d7
                                                                                                                                                            • Instruction Fuzzy Hash: 8D319A31E10B568ADB11AFB8D8112C9B3B1FF99320F25871AE159B7241EB74B5D4CB80
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7a892b31ef9caedcd8158c98e82c8bd40cc666df494de7609bb16c355014f8da
                                                                                                                                                            • Instruction ID: ac7b1853d9e0817740acfd21a7743b715b239dfe5f96d19405810cb5d67c90f5
                                                                                                                                                            • Opcode Fuzzy Hash: 7a892b31ef9caedcd8158c98e82c8bd40cc666df494de7609bb16c355014f8da
                                                                                                                                                            • Instruction Fuzzy Hash: 58317A31E10B168ADB10AFB8D8112D9B3B1FF99324F24871AE65977641EB70B5D4CB80
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b2531736966542f980411349d31e982fe37406672f3f2787c6148e2e3e4f4257
                                                                                                                                                            • Instruction ID: 3170c480211e316f692836957ab8f59ae18d9d1d596dc6a20985e597b06c5b2e
                                                                                                                                                            • Opcode Fuzzy Hash: b2531736966542f980411349d31e982fe37406672f3f2787c6148e2e3e4f4257
                                                                                                                                                            • Instruction Fuzzy Hash: CA31B1302187499BCB20CF6DD844F9BBBA5EF84324F048E29E4598B691DB70E945CB90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a86dfb3d36fb8e959050a5d71d30cf34a1f6fc8347ce47401bbd3aa685bbb07e
                                                                                                                                                            • Instruction ID: 14b5a451b89f358d0b1fcac55ff170c1602d6b33d42328866e8fba90d7eeea05
                                                                                                                                                            • Opcode Fuzzy Hash: a86dfb3d36fb8e959050a5d71d30cf34a1f6fc8347ce47401bbd3aa685bbb07e
                                                                                                                                                            • Instruction Fuzzy Hash: BD315C357042448FDB15DFA9C4A8AAABBF6EF89710F1504ACE5069B3A2CF319D40CB50
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: c784ce87993cf6091728f7d9ebbb23ef30666815a437f87c43152c04d7a54f99
                                                                                                                                                            • Instruction ID: 5d405727d817d853d1d1ff82b98b1cdd97c7d7d5782108bca667df9458278b7f
                                                                                                                                                            • Opcode Fuzzy Hash: c784ce87993cf6091728f7d9ebbb23ef30666815a437f87c43152c04d7a54f99
                                                                                                                                                            • Instruction Fuzzy Hash: E1310C35A00129EFDF019FE0E84589EBFB6FB88301F109519E601A7262DB3A5964DF64
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 28fd635d03d209a5543710aeb7e4a072a664529f50884f49da6b6d3bbcaf9c99
                                                                                                                                                            • Instruction ID: 2f60838e82b6113dc105b564c9f98fec768bef09d8f32e40594ed397a99c69c7
                                                                                                                                                            • Opcode Fuzzy Hash: 28fd635d03d209a5543710aeb7e4a072a664529f50884f49da6b6d3bbcaf9c99
                                                                                                                                                            • Instruction Fuzzy Hash: F331A035E006178BCB11AFB9D4152AEB3B5FF85304B10862ED55AF7742EF38A945CB90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: cd1fd3fb28de174a026a5e332fba9b14c3d696ba470b4575a567ceb0429555b7
                                                                                                                                                            • Instruction ID: 614059570a488e969b8417088aeb4efa87951a77611f86db165eac222f705cb5
                                                                                                                                                            • Opcode Fuzzy Hash: cd1fd3fb28de174a026a5e332fba9b14c3d696ba470b4575a567ceb0429555b7
                                                                                                                                                            • Instruction Fuzzy Hash: 71216D34604209DFDF11DF68C895AAABBB5FF85310F14846AE911CB361DB30ED41CBA0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: c0b1cd64d0f7dee2c085585ec53b5bf1fc1053d341fc03ae069cf6315477b9aa
                                                                                                                                                            • Instruction ID: d309686ab4968dc040608571800984011baa619fd02a610b870ac183e76dc4b1
                                                                                                                                                            • Opcode Fuzzy Hash: c0b1cd64d0f7dee2c085585ec53b5bf1fc1053d341fc03ae069cf6315477b9aa
                                                                                                                                                            • Instruction Fuzzy Hash: 7621F6303047108FC714ABB9E85172A77A7EFC1215B188C2DD242CB392CFB5AC0A8778
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b31848db30eb6c9a03e0e9182676b3d6f8632b7b0a1451834c34c2c518c0b673
                                                                                                                                                            • Instruction ID: 768adcd0f50ac2fd14f1532c395cd1804c9be22f8a0fd98676197d3bd6f21e4a
                                                                                                                                                            • Opcode Fuzzy Hash: b31848db30eb6c9a03e0e9182676b3d6f8632b7b0a1451834c34c2c518c0b673
                                                                                                                                                            • Instruction Fuzzy Hash: 81218E343082529BDB1A1B39B62D2797AA9DB51702B08186DE097C7783EB2DC8549B62
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: f2341148d9860a2d093ee548e03a74586e25d09647386ec226d542cd6db5295d
                                                                                                                                                            • Instruction ID: c24948bc7b4ee967d73f744a4842e0e30b5c24a377a6250d52a892baf0b92f07
                                                                                                                                                            • Opcode Fuzzy Hash: f2341148d9860a2d093ee548e03a74586e25d09647386ec226d542cd6db5295d
                                                                                                                                                            • Instruction Fuzzy Hash: 4121B034308292CBCF1A1B39B61D23D7BA8DB51712708186CF097C7693EB2CC815EB62
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ce2360db9f6eb3e363563c2120282cd55d0f804c921f7d9bca6eb38c978eadfc
                                                                                                                                                            • Instruction ID: 6a612fe46d49575fb0c8064391e1a8b4bc80ad53b8c4c087f47e938d45dc4009
                                                                                                                                                            • Opcode Fuzzy Hash: ce2360db9f6eb3e363563c2120282cd55d0f804c921f7d9bca6eb38c978eadfc
                                                                                                                                                            • Instruction Fuzzy Hash: 2F215E30318746CFCB61DF2CD49099E77A2AFC531870A8E6DE145CB365E774AD098B91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ed39541672b87fd6746e109d7eb07968a72a30b1e1bf3d2be871c1b8b19fe936
                                                                                                                                                            • Instruction ID: b1898ed48156ff4df0a4622400b92d9a79ced5a43020edb592e9337d698cbff8
                                                                                                                                                            • Opcode Fuzzy Hash: ed39541672b87fd6746e109d7eb07968a72a30b1e1bf3d2be871c1b8b19fe936
                                                                                                                                                            • Instruction Fuzzy Hash: 9011BE30710B1A9BCB40EF29E861A4FB3B6FFC0204B144E28D2459B755DB74BD0A8BE5
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e6df72fcc728602936cc86af59ec897f0ba6eef157247470a37841a00aed7d85
                                                                                                                                                            • Instruction ID: 36d9b444f8c9c482a804ae29f856108407decefd45ba076c00c1831ef08bb4d4
                                                                                                                                                            • Opcode Fuzzy Hash: e6df72fcc728602936cc86af59ec897f0ba6eef157247470a37841a00aed7d85
                                                                                                                                                            • Instruction Fuzzy Hash: CC11C8343017509FC7115BB8A86462B7BA7EFC6315B184C6DD187CB392CBB5AC06C764
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 0efbca82f89e5325fe27745d2920fb1da71ba5df8ab31f1a446f85c392685923
                                                                                                                                                            • Instruction ID: f51f8de3803ffcd05de660c0943ad13d44272934f2403d2e906009bacc81fe36
                                                                                                                                                            • Opcode Fuzzy Hash: 0efbca82f89e5325fe27745d2920fb1da71ba5df8ab31f1a446f85c392685923
                                                                                                                                                            • Instruction Fuzzy Hash: 4A11FB3131460ACBCB60DF2DD89199B73A6AFC42587058E28E5598B764EBB4FD098BD0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b471c18b98a31d604dee34cabbb8369cb46607472ca90fe0bfb674a2b32922df
                                                                                                                                                            • Instruction ID: 8e76349cd026c23fc3764647c551afca79d8db4cbe79555252b3dd69dc88a1c3
                                                                                                                                                            • Opcode Fuzzy Hash: b471c18b98a31d604dee34cabbb8369cb46607472ca90fe0bfb674a2b32922df
                                                                                                                                                            • Instruction Fuzzy Hash: A71132356002108FCB04DF6DD898D6ABBBAFF49710B1640AAE905DB372C730EC40CBA0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b7c039e306487b99c023c6382e725b68939ee0fd9dbdce5da791377100f8455a
                                                                                                                                                            • Instruction ID: 9b18bef0f8535819c9cc5ea259b2197ef38cb45c5413fb5657965efe062e5014
                                                                                                                                                            • Opcode Fuzzy Hash: b7c039e306487b99c023c6382e725b68939ee0fd9dbdce5da791377100f8455a
                                                                                                                                                            • Instruction Fuzzy Hash: 590184343007149FC7545BB4E86472AB7ABEBC5316F18482DE647C7791CFB5AC068B68
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 518311d7f7839394448f20a6d2771e5680c773010434737f80b11be7567bc7ec
                                                                                                                                                            • Instruction ID: f48b5eece595d7cce451efcca42c1d47ee121aeb649eb4fa53acb21496ac1416
                                                                                                                                                            • Opcode Fuzzy Hash: 518311d7f7839394448f20a6d2771e5680c773010434737f80b11be7567bc7ec
                                                                                                                                                            • Instruction Fuzzy Hash: 6C118F34604164DFDB02DFA4E84698DBFBAFB89311F151559E210EB222CB3A6C65CF24
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d98d49bd85918a67b631aa54f51254d1a52c11c30ee7c57dd474a7c21ac77719
                                                                                                                                                            • Instruction ID: 98c3d31fb3eec9620b272b2602f0ded1e936ab541f12ab9d73f11bde9b538916
                                                                                                                                                            • Opcode Fuzzy Hash: d98d49bd85918a67b631aa54f51254d1a52c11c30ee7c57dd474a7c21ac77719
                                                                                                                                                            • Instruction Fuzzy Hash: B10169343046408FCB04CB29E454CAABBB1AF8935471998AAE546CB632DBB1ED05CB90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7cb7f030257d496c7b594ed6c0ce171658d7681fd965e62bcc85a01b93bd9fbb
                                                                                                                                                            • Instruction ID: 265908ff9711bcfcb8d856b22faa7d2c74dcb50bc725dcae93fa76a2224777c1
                                                                                                                                                            • Opcode Fuzzy Hash: 7cb7f030257d496c7b594ed6c0ce171658d7681fd965e62bcc85a01b93bd9fbb
                                                                                                                                                            • Instruction Fuzzy Hash: EC0171313005218B8658A778F15443EB793FFC42293595D2CD206DB745DF787D1A4BB9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b61333e0e22c15f3fef49072dc13128744052171e1aa9fe366e7f5f151aa242a
                                                                                                                                                            • Instruction ID: 059929f187f1f40b8b077b826ac264149a15db5b1a2f030165acdcfa0674797c
                                                                                                                                                            • Opcode Fuzzy Hash: b61333e0e22c15f3fef49072dc13128744052171e1aa9fe366e7f5f151aa242a
                                                                                                                                                            • Instruction Fuzzy Hash: 78014C313005228B8758AB78B16447D7793FEC42293595D2CE206DB745DF387D1A4BA9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: c5feeefbd2a3cc9d7440f3c727603178b0e5e69f754956ce1101dfa81554745a
                                                                                                                                                            • Instruction ID: cc11262d2735fda26bf962c5e551354039bf26c65a845b680358b9f01d47a0e7
                                                                                                                                                            • Opcode Fuzzy Hash: c5feeefbd2a3cc9d7440f3c727603178b0e5e69f754956ce1101dfa81554745a
                                                                                                                                                            • Instruction Fuzzy Hash: 6D01B175600B418FEB15CF79E5084A6FFB2FB893257049A5ED48AC7A22CB30651ACF60
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 9a5e589984dbd61f238f311776ce2ac5a791eddc5e817a1951a5325090a7a318
                                                                                                                                                            • Instruction ID: 7a2c88b1bcc093c6f2c536dff6865bdd3d88286d54db21bf73da0d4db1e9b596
                                                                                                                                                            • Opcode Fuzzy Hash: 9a5e589984dbd61f238f311776ce2ac5a791eddc5e817a1951a5325090a7a318
                                                                                                                                                            • Instruction Fuzzy Hash: B801DF30610A169FCB10DF28E890A9EB7B2FF80348B040E2CD18687741DB34A90A8BE4
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: beca8f476d075ef044bbaac3f1fbfe806b09c999226fd85a3b0e2af851b1981e
                                                                                                                                                            • Instruction ID: d2579e7a19a15eca8b2f7d3714c9059062a4242594f6cf1dc343a237e936b94d
                                                                                                                                                            • Opcode Fuzzy Hash: beca8f476d075ef044bbaac3f1fbfe806b09c999226fd85a3b0e2af851b1981e
                                                                                                                                                            • Instruction Fuzzy Hash: 83F0FFB2304250CFCB00CB2DE8A49A9BBA1FF96242709C49AE145CF272E738ED06C750
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 08875eb16862d745e59a24aae565faa710787bb985065a76a374ef05ccc4c56d
                                                                                                                                                            • Instruction ID: 3228c86e0c6279de203876beb100d610eb017f0dce7f02175ef53a0968107af6
                                                                                                                                                            • Opcode Fuzzy Hash: 08875eb16862d745e59a24aae565faa710787bb985065a76a374ef05ccc4c56d
                                                                                                                                                            • Instruction Fuzzy Hash: B10146343006058FC754CB29E454CAAB7A6BF846147568869E505CB721EBB0FD018B90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4c83db0d89b5df6d698d16582717946fc4a1b9ce37f8d8bba7ed3f6a81da5a67
                                                                                                                                                            • Instruction ID: f1d52905699a8b30f9f432bc1dc23daa1a252f17606b1669371ba81c3ee45143
                                                                                                                                                            • Opcode Fuzzy Hash: 4c83db0d89b5df6d698d16582717946fc4a1b9ce37f8d8bba7ed3f6a81da5a67
                                                                                                                                                            • Instruction Fuzzy Hash: 4C017C30A04258DFCB45EFB8E45649CBFB2EF4A304B1418AEC445E7392DB344E19CB66
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e5d72aab730077e09f394ebb6649e7808c6cdad865901bb4ff97b0aad99faec4
                                                                                                                                                            • Instruction ID: 368e92cea278e2de2f3c2fb51960efd30f720b50b970ceb23b4771ef9dccc714
                                                                                                                                                            • Opcode Fuzzy Hash: e5d72aab730077e09f394ebb6649e7808c6cdad865901bb4ff97b0aad99faec4
                                                                                                                                                            • Instruction Fuzzy Hash: E0F0823120E3D45FCB07537A58504697F7A8DC711430A44FBC645CF663DE258C09C3A2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: f1cec608aae193b9c3061bc8ec9611a6b5f97ff766d7fb75917c32e5ab955cac
                                                                                                                                                            • Instruction ID: d0f1dac07150db3da13587ebf1a8b0b567daf441a46551a27d5c8c3379c3055e
                                                                                                                                                            • Opcode Fuzzy Hash: f1cec608aae193b9c3061bc8ec9611a6b5f97ff766d7fb75917c32e5ab955cac
                                                                                                                                                            • Instruction Fuzzy Hash: 27F05931B052044FD7149E69D8847ABFBB9EFC5320F00847ED50A87351DB71AC04CB90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7d1324787d1e33adb2c4b06ec0f5685713d8c28e143d1c4c42d64fb0f1b7f35d
                                                                                                                                                            • Instruction ID: d8b56f3133d1ee7071b977b76d43cab56afc015935b736e273d1ef123d4bb6b4
                                                                                                                                                            • Opcode Fuzzy Hash: 7d1324787d1e33adb2c4b06ec0f5685713d8c28e143d1c4c42d64fb0f1b7f35d
                                                                                                                                                            • Instruction Fuzzy Hash: A9016430A046599FDB50DF69D4184EEBFF0FF88320B184A2ED8DAE3201D7345A05CB90
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 19606c2c4f0e14386ae5f793b6044ff97c000568b57144bc0d5bfe4782b8d904
                                                                                                                                                            • Instruction ID: 69074fa5bf88057e4ccf0a66b09c3e4c17289ecf2ffe9fb96f1e839c20b949cc
                                                                                                                                                            • Opcode Fuzzy Hash: 19606c2c4f0e14386ae5f793b6044ff97c000568b57144bc0d5bfe4782b8d904
                                                                                                                                                            • Instruction Fuzzy Hash: BAF0F0302086068BEB309F6DE405722B2D5EB40319F10893DD11AC67D2CBBCDA959BA9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 44d3fe122575cdac731448a89718967edcabcb8f64842fb6ae440aceaed9bb5f
                                                                                                                                                            • Instruction ID: 95d42149ac0871d5663caff44ab9cce03ab8ba56056c53c882d8d36ca7804de1
                                                                                                                                                            • Opcode Fuzzy Hash: 44d3fe122575cdac731448a89718967edcabcb8f64842fb6ae440aceaed9bb5f
                                                                                                                                                            • Instruction Fuzzy Hash: 30F0B43230A6929FC3019F28E4548497FB9AF8662030985EAD4888B322CB24DD41C7C1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 848f68d57e9dc7d9e6f167badc6c3f851ca55b5d056fb3b3a5845f67f102c30f
                                                                                                                                                            • Instruction ID: 6966e21ffdaf6f5edc7ce9d7437f68eeefaa7d836b4a1bff4f32235d0b624e11
                                                                                                                                                            • Opcode Fuzzy Hash: 848f68d57e9dc7d9e6f167badc6c3f851ca55b5d056fb3b3a5845f67f102c30f
                                                                                                                                                            • Instruction Fuzzy Hash: 48F08C30A00218EFCB84EFB8E55649CBBB1FF45308B10186DD409E7352DB305F088B66
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7e5e2b032b54b5dcf1468eb44b5f19df8e856e089ac1acde4174f29378aafdac
                                                                                                                                                            • Instruction ID: 7066c69d36da96f7fb9ec315e553de3eb2dda72ec75968c8217a232dd5409761
                                                                                                                                                            • Opcode Fuzzy Hash: 7e5e2b032b54b5dcf1468eb44b5f19df8e856e089ac1acde4174f29378aafdac
                                                                                                                                                            • Instruction Fuzzy Hash: C7F09A35B102048BCB248B9CD4044DDBBF2EFCA701F26017ED989AB3A4D7705D01CB91
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d95170ea4faef9612ec79eb23dadf32368b3d209223ebd8bf51135867ce5801d
                                                                                                                                                            • Instruction ID: 021fc1c002dd0f3b21eeb80d8b77be65f91c8efbf6a26f1175d8a46d0767a2dc
                                                                                                                                                            • Opcode Fuzzy Hash: d95170ea4faef9612ec79eb23dadf32368b3d209223ebd8bf51135867ce5801d
                                                                                                                                                            • Instruction Fuzzy Hash: C7F0A7356081286BEB04DAADA4156D9BBEDDB45325F1440AEE108D3281DE75D941C794
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e21ebcf3527fa710bf3b93954d6a7a562db8095ad37bb9cd446080f76edede7f
                                                                                                                                                            • Instruction ID: 9780d4e20a2358cc8004606608fae5a85185a25d7ccc8fd27d1caee27af2d63d
                                                                                                                                                            • Opcode Fuzzy Hash: e21ebcf3527fa710bf3b93954d6a7a562db8095ad37bb9cd446080f76edede7f
                                                                                                                                                            • Instruction Fuzzy Hash: 0B01B235A06219AFDF00DF94D895FEEBB72FF48304F248419E802BA2A1CB756941DB61
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 244b131028c72e67045e65c46170874c405087b103172a6472ea41b8416bce13
                                                                                                                                                            • Instruction ID: 37ea14eb69a90ec9063e3029a9278b65eac6ab4a0ca506511d11f777f5388968
                                                                                                                                                            • Opcode Fuzzy Hash: 244b131028c72e67045e65c46170874c405087b103172a6472ea41b8416bce13
                                                                                                                                                            • Instruction Fuzzy Hash: 47F0F475A042199FCB50EFA9D4085DEBBF5FF88721B044A2AD45AE3300D774AA05CBD4
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 10cecd24161a914d6809f666842b395708abc97144e837ea60fb5ec2d767ae4e
                                                                                                                                                            • Instruction ID: 2a2471e963b99c2a912007460fd92c1475b4e3f66b0bc05ef1f5f636a27b1253
                                                                                                                                                            • Opcode Fuzzy Hash: 10cecd24161a914d6809f666842b395708abc97144e837ea60fb5ec2d767ae4e
                                                                                                                                                            • Instruction Fuzzy Hash: E0F0E2316082A46FEB05C6ACA8507E5BFEA8B4A320F1840EFD004D72D2CA25CA42C794
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d39c70bc30d4e4bd87473567ad681b0e24d4631461e195c51a4936e84edd5f25
                                                                                                                                                            • Instruction ID: 70c0de2f74a303d08c3da66abd808420930500ca27a61ef20bc74ba9ca884550
                                                                                                                                                            • Opcode Fuzzy Hash: d39c70bc30d4e4bd87473567ad681b0e24d4631461e195c51a4936e84edd5f25
                                                                                                                                                            • Instruction Fuzzy Hash: 40E065312042206FC7156A69B44869FBA9AEBC5365B44482CF20ED3383DA65581987B9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 1341cbb53eebfc381bc76dae02a13982c9a434803e59f821987f5954175675ae
                                                                                                                                                            • Instruction ID: 4e85d2535f1e921f1434148cbc56ee86b00c3e5d16f7e20598eb98bdd5255ddc
                                                                                                                                                            • Opcode Fuzzy Hash: 1341cbb53eebfc381bc76dae02a13982c9a434803e59f821987f5954175675ae
                                                                                                                                                            • Instruction Fuzzy Hash: 25F0202520C264ABC70162ADB808846BA5ACBC622134484AEF205C3343DA690C2887B6
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7237d60f21db40333002420b7b4d185431cd1ceddea9ef5bba2be3d33454b0d5
                                                                                                                                                            • Instruction ID: 361edf18d33292fcdeaab5ba99d4ed791f1aee6c8c9ddc4d1096a88cdf331df9
                                                                                                                                                            • Opcode Fuzzy Hash: 7237d60f21db40333002420b7b4d185431cd1ceddea9ef5bba2be3d33454b0d5
                                                                                                                                                            • Instruction Fuzzy Hash: 62F0E93065C760CFC350EB7DD85505A7BD1DD82301348CC6DD086CA661DB24A5098761
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b7cb6c5350b55e2c64bf72a2551059d25e7b952f44d88cd3c11a7263592e1f92
                                                                                                                                                            • Instruction ID: 3de0d6aa5d26c98aa17e701898d56ab592fd26c77c7f2e3b8d322e09a227a964
                                                                                                                                                            • Opcode Fuzzy Hash: b7cb6c5350b55e2c64bf72a2551059d25e7b952f44d88cd3c11a7263592e1f92
                                                                                                                                                            • Instruction Fuzzy Hash: 76E09B313001205FC7142A59F44855FBA9AEBC5365700442CF20DD3382CE65581547B9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: f3c2f32ff3c12205076a594dc2a0f7c14550cadc1b36b3cdea759005969296c0
                                                                                                                                                            • Instruction ID: d39a2c25fe522c44b629d8302bc386c6dc8e4741ba2be4fae30cbee2d8f35b15
                                                                                                                                                            • Opcode Fuzzy Hash: f3c2f32ff3c12205076a594dc2a0f7c14550cadc1b36b3cdea759005969296c0
                                                                                                                                                            • Instruction Fuzzy Hash: 5BF065363055269FC7149F2DE454C59B7ADEF857203098199E4599B321CB25ED41C7D0
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 0bfde1c63c378ccca6680735f4e2351907cc6cfe0f9919bc074d875ff5e95932
                                                                                                                                                            • Instruction ID: da5e6181c8d59680637865743e14c7bc110a7a115dd4025b548788bdd0fdcea9
                                                                                                                                                            • Opcode Fuzzy Hash: 0bfde1c63c378ccca6680735f4e2351907cc6cfe0f9919bc074d875ff5e95932
                                                                                                                                                            • Instruction Fuzzy Hash: 7FF0233224D7859FC722863DE804663BFA9DBD137170D847ED595C7501D514DC10C7A5
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a5e9f365dcef5a46f4a0cd33732527b97d998bb9e8d424eb7c1b98511ac7d1bd
                                                                                                                                                            • Instruction ID: 104314ca82c4d4e836f6d118bb9f32f48745a12d2139d3ca6544d0fd2b65b582
                                                                                                                                                            • Opcode Fuzzy Hash: a5e9f365dcef5a46f4a0cd33732527b97d998bb9e8d424eb7c1b98511ac7d1bd
                                                                                                                                                            • Instruction Fuzzy Hash: 20F05470500B118FE714DF66E508556FBF6FF88705B00962EE88E82B61DB74A459CF54
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 6e4c2ec08329607c5dcc2ad0b23a54571fae18cb2077b34226a0293da8f08b52
                                                                                                                                                            • Instruction ID: 23a4a7f9122730ce038aa8f03e69d96d842ea55568ea012d8fcf4827de2e90d9
                                                                                                                                                            • Opcode Fuzzy Hash: 6e4c2ec08329607c5dcc2ad0b23a54571fae18cb2077b34226a0293da8f08b52
                                                                                                                                                            • Instruction Fuzzy Hash: AAF0A030204771CFC715AB29E41865A7BA7DFC1319F04082EE286CB711CBA6AC198BE6
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 862bd2885b99bdba76b9a7386b2183bfcef0a79dd756a6c57a6d5fca4636fe4b
                                                                                                                                                            • Instruction ID: 4d1267810e210d82c9d2774e2e4768beb283642e77a91dc883205716afbae3f1
                                                                                                                                                            • Opcode Fuzzy Hash: 862bd2885b99bdba76b9a7386b2183bfcef0a79dd756a6c57a6d5fca4636fe4b
                                                                                                                                                            • Instruction Fuzzy Hash: 04E0DF35308038A7C70466AAB84885ABA9FDBC832170044ADF709C3342DFB95C1C8ABA
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 9962c2b6bbb398f90da3e248ac7b0d8c004bde36e546c67a6b102827d8746197
                                                                                                                                                            • Instruction ID: 585f55c795e18b6a31bf6f6b7e643d3998652c5539f561f4b6028a014cc0de59
                                                                                                                                                            • Opcode Fuzzy Hash: 9962c2b6bbb398f90da3e248ac7b0d8c004bde36e546c67a6b102827d8746197
                                                                                                                                                            • Instruction Fuzzy Hash: 6AE0D8313041619FC6166B68B81C56DBF96EFC1221704046EF106CB282DF652825C7E9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 32f2d73d93cd14c4eda8c5c7147aa8755fd4f3a1f82773b829796bb09a5e735e
                                                                                                                                                            • Instruction ID: 8d20324b6eb02dc315c3de25fd7266ee75a9c44b6ca22326fe579f8610384c75
                                                                                                                                                            • Opcode Fuzzy Hash: 32f2d73d93cd14c4eda8c5c7147aa8755fd4f3a1f82773b829796bb09a5e735e
                                                                                                                                                            • Instruction Fuzzy Hash: 4DE06530204771CBC710972DE41465ABBE7DBC1319F04082ED286C7751CBA5B8498BA6
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a557d6889d6437aacf7ee94e65f3277a1b928cd139667c1aebcee3408f317059
                                                                                                                                                            • Instruction ID: 7c39319fad9e1b75d6940f069aa3744296a8408ea1b8a2f37d36226cd1e85e96
                                                                                                                                                            • Opcode Fuzzy Hash: a557d6889d6437aacf7ee94e65f3277a1b928cd139667c1aebcee3408f317059
                                                                                                                                                            • Instruction Fuzzy Hash: 6AE0DF317042508FCB07DB78E8088843FB4DF0320130A00EAE849CB272DB20CC14CBE2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7f60974c8e7e845921d6598f471952fc7299e34d3419de4a49b396bc99d36c40
                                                                                                                                                            • Instruction ID: 5adea5d33c6eb0ff7a34ba7844aa668c7bdbe4da8b729f1dd5705becfcffd5a7
                                                                                                                                                            • Opcode Fuzzy Hash: 7f60974c8e7e845921d6598f471952fc7299e34d3419de4a49b396bc99d36c40
                                                                                                                                                            • Instruction Fuzzy Hash: D8E0C23250C3647F8B079AA5581088D3F748E82120B0A40D7E198DF261DA74090887F2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d7dca26961f2f290c9b7edcf424fb89f6b137d4d87bfcd5b2230c7d707d2bcf3
                                                                                                                                                            • Instruction ID: 8c0a9a0b03da3ff26d9247a9d804c276442ecdc2445a0f760ed29849ba26cbf9
                                                                                                                                                            • Opcode Fuzzy Hash: d7dca26961f2f290c9b7edcf424fb89f6b137d4d87bfcd5b2230c7d707d2bcf3
                                                                                                                                                            • Instruction Fuzzy Hash: 44D05E353005249B8A143B69B81C4AEBFABEEC5672304042DF607C7382CF762D1687E9
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 97bc27b1a4c5b4da401013d88336eb4bf17c7508ea28e15a900c4ad1511cb47c
                                                                                                                                                            • Instruction ID: abc8fa041d10d738652d76378001fd9bd2ac7f249461642ca559f2a8abb05d9a
                                                                                                                                                            • Opcode Fuzzy Hash: 97bc27b1a4c5b4da401013d88336eb4bf17c7508ea28e15a900c4ad1511cb47c
                                                                                                                                                            • Instruction Fuzzy Hash: 89E09A312086A88FEB06CB3AE0612423BF5EF8A300F0484DAC180CB2A7C779D849CB51
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ce84a4ba6e8f4445ef7d1f1baddc549cde104c8c9fb9e2608b9875baf2768819
                                                                                                                                                            • Instruction ID: 2bbdb463097c3bb826c9ee925f1e8b1b734b4d8cceac0a1acffaa709098f89b7
                                                                                                                                                            • Opcode Fuzzy Hash: ce84a4ba6e8f4445ef7d1f1baddc549cde104c8c9fb9e2608b9875baf2768819
                                                                                                                                                            • Instruction Fuzzy Hash: 2AE09AB4D0420D9F8B54DFA9D4415BEBFF4AB59200F10856AD558E3240E6345A51CFD1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 2cee905ba838d43beadb329a4e5d689e505c62cf9e61a3ecb7ccd5494fb78325
                                                                                                                                                            • Instruction ID: 9f6ba4bb5b26d944a15d2d98d52ba9c9b69339845871c80cf542768b3fcf25c9
                                                                                                                                                            • Opcode Fuzzy Hash: 2cee905ba838d43beadb329a4e5d689e505c62cf9e61a3ecb7ccd5494fb78325
                                                                                                                                                            • Instruction Fuzzy Hash: 7ED02233A0432C6B0B08DAA954008CEBBBDCA84034B0140AAE20CCB300EE70190846E6
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 818316afea14b0028745d875ede58316306d53de8a193bb99e002615d392f58f
                                                                                                                                                            • Instruction ID: 25aac67790464ebae7d95a5ef8525d090ad0f285d614f17d3d2b294f1467a537
                                                                                                                                                            • Opcode Fuzzy Hash: 818316afea14b0028745d875ede58316306d53de8a193bb99e002615d392f58f
                                                                                                                                                            • Instruction Fuzzy Hash: 96D0A5367151514FDB7917745415075BFB6EFD522031D41FFDC55C3545EE544D104341
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 71ccb7b833532b01040b93da77a2a6608074a0d1acc87cc931384c1eeda6639c
                                                                                                                                                            • Instruction ID: 21b55955375b3299d93b3db995dbb767323f52385a9bd419b9f14e5f8609f809
                                                                                                                                                            • Opcode Fuzzy Hash: 71ccb7b833532b01040b93da77a2a6608074a0d1acc87cc931384c1eeda6639c
                                                                                                                                                            • Instruction Fuzzy Hash: 5ED05E3130982197DF41AA9CF4057E93767E7C8327F1880A9E1449A24AC769AA029B89
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: af880a570b5b7ad994b194e5a689505187623fd7fea4b52e1ffea522bb62c86b
                                                                                                                                                            • Instruction ID: 89eb8b31541e2001390bbda976fbca571dd62fb459eb6e812588bc5e0367aa5d
                                                                                                                                                            • Opcode Fuzzy Hash: af880a570b5b7ad994b194e5a689505187623fd7fea4b52e1ffea522bb62c86b
                                                                                                                                                            • Instruction Fuzzy Hash: 92E08CB828847D8BE701EB3DF0960D87799EA84204716091CD644C7286C7285C0A879A
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4d533ae242def61d5270c4161d361e47ccbe6869b93b8f195cac66aa6368b754
                                                                                                                                                            • Instruction ID: cf56428877b4a27cea172d6b7930b0d54e62142ccbfb5f3a2abdabfda27676b9
                                                                                                                                                            • Opcode Fuzzy Hash: 4d533ae242def61d5270c4161d361e47ccbe6869b93b8f195cac66aa6368b754
                                                                                                                                                            • Instruction Fuzzy Hash: 14C002710492A15EDB174B64D8154613F78ED5228934A40DAD2609F2A6C71D188DCBB1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 285fd9cdb1acbac39a798b7558ddb4dc0c1e82824c006b02e1a990ca0467e6a5
                                                                                                                                                            • Instruction ID: 63f581e434ff484975b8de8f7e80328543399c05650a515559f66cf62f10d716
                                                                                                                                                            • Opcode Fuzzy Hash: 285fd9cdb1acbac39a798b7558ddb4dc0c1e82824c006b02e1a990ca0467e6a5
                                                                                                                                                            • Instruction Fuzzy Hash: C4D01231046395DFCB425B34A0593457F38FB82514F454980D18D4F1239B646C2A87F5
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 06723b014ee0d84cde266f8e3fd21cfc173d15b39c49f864013d577d3ffee026
                                                                                                                                                            • Instruction ID: 7a4af126309440a98ce6a739a43b192810a857d7f6a351d78cb026dd5b28a016
                                                                                                                                                            • Opcode Fuzzy Hash: 06723b014ee0d84cde266f8e3fd21cfc173d15b39c49f864013d577d3ffee026
                                                                                                                                                            • Instruction Fuzzy Hash: DDC0920100F7C09FC30307342C2B6A33FF66DA321038B81C792C1EA5A3A14E0806ABB6
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 6085836c9cd0dbab66ca10f24aa051f35a661b27a5005adadf824e156e41098a
                                                                                                                                                            • Instruction ID: 1f055c15364fdb4d26f32a8b01b874da21e6edf3ddb006952323d01785767938
                                                                                                                                                            • Opcode Fuzzy Hash: 6085836c9cd0dbab66ca10f24aa051f35a661b27a5005adadf824e156e41098a
                                                                                                                                                            • Instruction Fuzzy Hash: 29B0123005621ECBCB406F68F415448772DF6802087401810D30C461175B753C1246D8
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Non-executed Functions

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-123412466
                                                                                                                                                            • Opcode ID: 9fd86549cf5d59e92bd8556307f6808232b9566a30981363dce739b846c53991
                                                                                                                                                            • Instruction ID: 16acdc2eb27f32db0dae3bd79e1dc59c9e953fb4c6897c90752291a10cd56bfd
                                                                                                                                                            • Opcode Fuzzy Hash: 9fd86549cf5d59e92bd8556307f6808232b9566a30981363dce739b846c53991
                                                                                                                                                            • Instruction Fuzzy Hash: 8DF1B334B04210AFDF05DB78D4146ADBFB6EF86300F14846EE946DB382DB359D168BA2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-880640838
                                                                                                                                                            • Opcode ID: 5ea43840e7db759a26e90e31d973e26c8f24e6045cdd3e6eaa710239e5255831
                                                                                                                                                            • Instruction ID: 9b6b6940025dbf74aed6737085772eb708cd298d9b12c3f64eca80bd7f19c6cd
                                                                                                                                                            • Opcode Fuzzy Hash: 5ea43840e7db759a26e90e31d973e26c8f24e6045cdd3e6eaa710239e5255831
                                                                                                                                                            • Instruction Fuzzy Hash: 9EC1F034A042109FDB05DB78D4146AEBFB6EF86304F14846ED84ADB392DB359D46CBA2
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: ,~>i$,~>i$,~>i$,~>i$,~>i$,~>i$,~>i
                                                                                                                                                            • API String ID: 0-4056001551
                                                                                                                                                            • Opcode ID: df45fb0cd9c8c8218feed7bc04a1b017ace2d33a27a066f4e7d96771da8b778c
                                                                                                                                                            • Instruction ID: f89611826df251c0f2dfc2344b790f4f5348722e780637e62740039a390dac45
                                                                                                                                                            • Opcode Fuzzy Hash: df45fb0cd9c8c8218feed7bc04a1b017ace2d33a27a066f4e7d96771da8b778c
                                                                                                                                                            • Instruction Fuzzy Hash: A941B2343005705BE705A668E8A293F765FEBC5304F904E2DEA038B792CF795D0A47BA
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: ,~>i$,~>i$,~>i$,~>i$,~>i$,~>i$,~>i
                                                                                                                                                            • API String ID: 0-4056001551
                                                                                                                                                            • Opcode ID: 5929f246051c60718f12fb0c131ecf2c864f96f4c23368697a92ba9a609efd2d
                                                                                                                                                            • Instruction ID: a0044690ff8161e2834f487de61274c8942acce1c77301878096077a339c5201
                                                                                                                                                            • Opcode Fuzzy Hash: 5929f246051c60718f12fb0c131ecf2c864f96f4c23368697a92ba9a609efd2d
                                                                                                                                                            • Instruction Fuzzy Hash: C13192383004705BE609A625A8A263F769FEBD5340F15491DEA439B793CF3D6C0607AA
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: ,~>i$,~>i$,~>i$,~>i$,~>i$,~>i$,~>i
                                                                                                                                                            • API String ID: 0-4056001551
                                                                                                                                                            • Opcode ID: 0710f4a9305bef70f3e479b61ae66f7b30c23bb5bf0eee02ed587ea342c90727
                                                                                                                                                            • Instruction ID: 08a4aa8359686ef55ef3b586b7f17cae956fddb85923f23aecf329a2bf89ed99
                                                                                                                                                            • Opcode Fuzzy Hash: 0710f4a9305bef70f3e479b61ae66f7b30c23bb5bf0eee02ed587ea342c90727
                                                                                                                                                            • Instruction Fuzzy Hash: 9531C7383000705BE704A634E8A293F725FEBD5350F558A2DEA039B792CF3D5C0607AA
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: ,~>i$,~>i$,~>i$,~>i$,~>i$,~>i$,~>i
                                                                                                                                                            • API String ID: 0-4056001551
                                                                                                                                                            • Opcode ID: eb6d2a63391cc219a5a038e4de9b71420bf7e4347610e9af8fc080fa753f9f23
                                                                                                                                                            • Instruction ID: 5cff6d151d9939e9b41bc64ec1d55198caaf1384a7a7754d8b6c4dd17a57de94
                                                                                                                                                            • Opcode Fuzzy Hash: eb6d2a63391cc219a5a038e4de9b71420bf7e4347610e9af8fc080fa753f9f23
                                                                                                                                                            • Instruction Fuzzy Hash: CD3192383004745BE609A675A8A263F769FEBD5340F144D1DEA039B793CF3D6C0607AA
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-950928858
                                                                                                                                                            • Opcode ID: 391270f5b4939e9ccd736c8a2e02aa85344a791fcd199a3f2303f3dbd74872e8
                                                                                                                                                            • Instruction ID: f08b773aed6b152b65dace90531b74e54eb2c5d32888fffa17fe8a16d399f2c7
                                                                                                                                                            • Opcode Fuzzy Hash: 391270f5b4939e9ccd736c8a2e02aa85344a791fcd199a3f2303f3dbd74872e8
                                                                                                                                                            • Instruction Fuzzy Hash: 29910434B052509FDB14DB78D85466EBBFAEF86304B1584A9D905DB392EF30DC02CBA1
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000002.00000002.770112400.0000000000990000.00000040.00000001.sdmp, Offset: 00990000, based on PE: false
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: pfc$pfc$pfc$pfc
                                                                                                                                                            • API String ID: 0-1199382977
                                                                                                                                                            • Opcode ID: 2fd193158e7ff384c7e6a319b2537111862731be2af764c2d03af775e181accb
                                                                                                                                                            • Instruction ID: 2e89bdaac4d4dac3a4cece1c000c86a349b3b534e64e1893c538611c84781ef1
                                                                                                                                                            • Opcode Fuzzy Hash: 2fd193158e7ff384c7e6a319b2537111862731be2af764c2d03af775e181accb
                                                                                                                                                            • Instruction Fuzzy Hash: 39C1E874B001189FDB44DFA9D494AAEBBB6EF88304F118469E906EB3A5DB34DC42CF51
                                                                                                                                                            Uniqueness

                                                                                                                                                            Uniqueness Score: -1.00%