Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll
Analysis ID:1280994
MD5:d4257a85611eb9b8fc7da98ad7cd3b4c
SHA1:10a8821bd70d4afa52388ca04480085b98ac9227
SHA256:a7d13b0ae56c9d7759c0c20a5ea515760dffa8ea4fa366f9092e901b4579499b
Tags:dll
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Hides threads from debuggers
Creates an autostart registry key pointing to binary in C:\Windows
PE file has a writeable .text section
Tries to evade debugger and weak emulator (self modifying code)
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Entry point lies outside standard sections
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Installs a raw input device (often for capturing keystrokes)
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Yara detected Keylogger Generic
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5292 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll" MD5: 3B4636AE519868037940CA5C4272091B)
    • conhost.exe (PID: 5280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4932 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6364 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 7080 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6364 -s 748 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 320 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_Parse MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6304 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTuple MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6324 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTupleAndKeywords MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6796 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_Parse MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 2148 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTuple MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6900 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTupleAndKeywords MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6924 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7052 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7108 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • rundll32.exe (PID: 4868 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • rundll32.exe (PID: 2480 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    0000000E.00000002.831439500.00000000053CE000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      00000006.00000002.629611134.0000000004A99000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000005.00000002.629386243.0000000004F13000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 11 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllReversingLabs: Detection: 57%
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllVirustotal: Detection: 62%Perma Link
            Source: https://ebaoffice.com.br/imagens/bo/inspecionando.phpAvira URL Cloud: Label: malware
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllJoe Sandbox ML: detected
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
            Source: unknownHTTPS traffic detected: 187.45.187.42:443 -> 192.168.2.6:49693 version: TLS 1.2
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: iphlpapi.pdbUGP source: loaddll32.exe, 00000000.00000002.647197608.000000000283A000.00000040.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.546105070.0000000000CF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.526173512.0000000002D1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.0000000004A2A000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004C58000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernel32.pdb source: loaddll32.exe, 00000000.00000002.647099501.0000000000F24000.00000040.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.535262532.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008473183.00000000046FF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695223560.00000000049CA000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628693706.0000000004A68000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: iphlpapi.pdb source: loaddll32.exe, 00000000.00000002.647197608.000000000283A000.00000040.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.546105070.0000000000CF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.526173512.0000000002D1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.0000000004A2A000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004C58000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: advapi32.pdbUGP source: loaddll32.exe, 00000000.00000002.647197608.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004BE0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.828889556.0000000004620000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernelbase.pdb source: loaddll32.exe, 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009274858.0000000004BB1000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.526354577.0000000002995000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647314302.0000000002B35000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008725355.0000000004826000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.495607190.000000000468B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695323350.0000000004A48000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628847023.0000000004B8D000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.526354577.0000000002995000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647314302.0000000002B35000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008725355.0000000004826000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.495607190.000000000468B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695323350.0000000004A48000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628847023.0000000004B8D000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wuser32.pdb source: loaddll32.exe, 00000000.00000003.538203445.0000000002998000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647510965.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1010130762.0000000004DAA000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695939637.0000000004FDC000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.650243080.0000000005109000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernelbase.pdbUGP source: loaddll32.exe, 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009274858.0000000004BB1000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: advapi32.pdb source: loaddll32.exe, 00000000.00000002.647197608.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004BE0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.828889556.0000000004620000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernel32.pdbGCTL source: loaddll32.exe, 00000000.00000002.647099501.0000000000F24000.00000040.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.535262532.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008473183.00000000046FF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695223560.00000000049CA000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628693706.0000000004A68000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wuser32.pdbUGP source: loaddll32.exe, 00000000.00000003.538203445.0000000002998000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647510965.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1010130762.0000000004DAA000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695939637.0000000004FDC000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.650243080.0000000005109000.00000040.00000800.00020000.00000000.sdmp

            Networking

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 15.228.77.178 80Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: ebaoffice.com.br
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 187.45.187.42 443Jump to behavior
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Joe Sandbox ViewIP Address: 15.228.77.178 15.228.77.178
            Source: global trafficHTTP traffic detected: GET /imagens/bo/inspecionando.php HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ebaoffice.com.brConnection: Keep-Alive
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
            Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
            Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
            Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
            Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: rundll32.exe, 00000003.00000002.1013104330.0000000007010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
            Source: rundll32.exe, rundll32.exe, 00000003.00000002.1014696634.000000006AF59000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1011503402.0000000004FD0000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.742376267.000000006AF59000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.725061641.0000000005200000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.704747309.000000006AF59000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.indyproject.org/
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/
            Source: rundll32.exe, 00000003.00000002.1013104330.0000000007010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.ph
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628239248.0000000000A55000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FCD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.704747309.000000006AB51000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php...
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.000000000301F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php2
            Source: rundll32.exe, 00000005.00000002.628239248.0000000000A55000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php4
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php6
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php9
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpF
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpH
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpHistory
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpL
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpV
            Source: rundll32.exe, 00000003.00000002.1013104330.0000000007010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php_sC:
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpcU
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpe
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpofRA
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phporyHistory.IE5
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpp
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpr
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phps/bo/inspecionando.phpo.php
            Source: rundll32.exe, 00000005.00000002.628239248.0000000000A55000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phputllib.dll.DLL
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpx
            Source: rundll32.exe, 00000005.00000002.628305974.000000000301F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpz
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/m%
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaoffice.com.br/t
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comsoft
            Source: unknownDNS traffic detected: queries for: ebaoffice.com.br
            Source: global trafficHTTP traffic detected: GET /imagens/bo/inspecionando.php HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ebaoffice.com.brConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 187.45.187.42:443 -> 192.168.2.6:49693 version: TLS 1.2
            Source: loaddll32.exe, 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: DirectInput8Create
            Source: loaddll32.exe, 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: GetRawInputData
            Source: Yara matchFile source: 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.831439500.00000000053CE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.629611134.0000000004A99000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.629386243.0000000004F13000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.829864923.0000000004818000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.832391096.0000000004E0F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.822158662.0000000004B44000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.831948932.00000000049B3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.1009274858.0000000004BB1000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 320, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6364, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7052, type: MEMORYSTR

            System Summary

            barindex
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6364 -s 748
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC48520_2_00EC4852
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEEA010_2_00EEEA01
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC0CF20_2_00EC0CF2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC85920_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E770_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEDFA80_2_00EEDFA8
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AB5D3D03_2_6AB5D3D0
            Source: C:\Windows\System32\loaddll32.exeCode function: String function: 00F14A06 appears 33 times
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CCDCCAC appears 59 times
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CCDEEEF appears 86 times
            Source: C:\Windows\System32\loaddll32.exeSection loaded: security.dllJump to behavior
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllReversingLabs: Detection: 57%
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllVirustotal: Detection: 62%
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_Parse
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTuple
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTupleAndKeywords
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6364 -s 748
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_Parse
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTuple
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTupleAndKeywords
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr
            Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
            Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTupleJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTupleAndKeywords Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTupleJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTupleAndKeywords Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddrJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddrJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddrJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90Jump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D7C.tmpJump to behavior
            Source: classification engineClassification label: mal88.evad.winDLL@27/7@1/3
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_Parse
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6364
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5280:120:WilError_01
            Source: rundll32.exeString found in binary or memory: jp-ocr-b-add
            Source: rundll32.exeString found in binary or memory: JIS_C6229-1984-b-add
            Source: rundll32.exeString found in binary or memory: jp-ocr-hand-add
            Source: rundll32.exeString found in binary or memory: JIS_C6229-1984-hand-add
            Source: rundll32.exeString found in binary or memory: ISO_6937-2-add
            Source: rundll32.exeString found in binary or memory: NATS-SEFI-ADD
            Source: rundll32.exeString found in binary or memory: NATS-DANO-ADD
            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic file information: File size 7131136 > 1048576
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x502e00
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: Raw size of .sedata is bigger than: 0x100000 < 0x1c7e00
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: iphlpapi.pdbUGP source: loaddll32.exe, 00000000.00000002.647197608.000000000283A000.00000040.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.546105070.0000000000CF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.526173512.0000000002D1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.0000000004A2A000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004C58000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernel32.pdb source: loaddll32.exe, 00000000.00000002.647099501.0000000000F24000.00000040.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.535262532.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008473183.00000000046FF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695223560.00000000049CA000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628693706.0000000004A68000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: iphlpapi.pdb source: loaddll32.exe, 00000000.00000002.647197608.000000000283A000.00000040.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.546105070.0000000000CF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.526173512.0000000002D1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.0000000004A2A000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004C58000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: advapi32.pdbUGP source: loaddll32.exe, 00000000.00000002.647197608.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004BE0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.828889556.0000000004620000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernelbase.pdb source: loaddll32.exe, 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009274858.0000000004BB1000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.526354577.0000000002995000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647314302.0000000002B35000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008725355.0000000004826000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.495607190.000000000468B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695323350.0000000004A48000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628847023.0000000004B8D000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.526354577.0000000002995000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647314302.0000000002B35000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008725355.0000000004826000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.495607190.000000000468B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695323350.0000000004A48000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628847023.0000000004B8D000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wuser32.pdb source: loaddll32.exe, 00000000.00000003.538203445.0000000002998000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647510965.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1010130762.0000000004DAA000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695939637.0000000004FDC000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.650243080.0000000005109000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernelbase.pdbUGP source: loaddll32.exe, 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009274858.0000000004BB1000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: advapi32.pdb source: loaddll32.exe, 00000000.00000002.647197608.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1009109975.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695575249.0000000004BE0000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.828889556.0000000004620000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wkernel32.pdbGCTL source: loaddll32.exe, 00000000.00000002.647099501.0000000000F24000.00000040.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.535262532.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1008473183.00000000046FF000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695223560.00000000049CA000.00000040.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628693706.0000000004A68000.00000040.00000020.00020000.00000000.sdmp
            Source: Binary string: wuser32.pdbUGP source: loaddll32.exe, 00000000.00000003.538203445.0000000002998000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647510965.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1010130762.0000000004DAA000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.695939637.0000000004FDC000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.650243080.0000000005109000.00000040.00000800.00020000.00000000.sdmp
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F14A4B push ecx; ret 0_2_00F14A5E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ABA1DA4 push ecx; mov dword ptr [esp], edx3_2_6ABA1DA5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD8CCE0 push edx; mov dword ptr [esp], eax3_2_6CD8CCB8
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AB8D218 push ecx; mov dword ptr [esp], edx3_2_6AB8D21A
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ACA826C push ecx; mov dword ptr [esp], eax3_2_6ACA826F
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AB643F8 push ecx; mov dword ptr [esp], edx3_2_6AB643F9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AB79304 push ecx; mov dword ptr [esp], ecx3_2_6AB79307
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEA6C8 push edx; ret 3_2_6CCEC0E9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEA6C8 push dword ptr [esp]; retn 0004h3_2_6CCEC12C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEA6E7 push edx; ret 3_2_6CCEC0E9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCE86F3 push dword ptr [esp+04h]; retn 0008h3_2_6CCE9FAB
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEA6A1 push edx; ret 3_2_6CCEB7C6
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEA676 push edx; ret 3_2_6CCEB7C6
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEB61D push dword ptr [esp]; retn 0004h3_2_6CCEB66A
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AC38018 push ecx; mov dword ptr [esp], edx3_2_6AC38019
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDD0FD4 push ebp; mov dword ptr [esp], ebp3_2_6CDD113F
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDCCF9C push dword ptr [esp+02h]; mov dword ptr [esp], edx3_2_6CDCCFA3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AB5C9DC push ecx; mov dword ptr [esp], edx3_2_6AB5C9DD
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCE8709 push ebp; mov dword ptr [esp], edx3_2_6CCE870D
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCE8709 push dword ptr [esp+04h]; retn 0008h3_2_6CCE9FAB
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDD10DD push ebp; mov dword ptr [esp], ebp3_2_6CDD113F
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDB28C1 push bp; mov dword ptr [esp], edi3_2_6CDB2BD8
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDD10C1 push ebp; mov dword ptr [esp], ebp3_2_6CDD113F
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AC33E98 push ecx; mov dword ptr [esp], ecx3_2_6AC33E9C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEE892 push ecx; mov dword ptr [esp], eax3_2_6CCEE89B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEC04C push dword ptr [esp]; retn 0004h3_2_6CCEC12C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC7859 pushfd ; mov dword ptr [esp], ecx3_2_6CDC7901
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AC32E60 push ecx; mov dword ptr [esp], ecx3_2_6AC32E65
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC8076 push 8A240C8Ah; iretd 3_2_6CDC8096
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CCEE87C push ecx; mov dword ptr [esp], eax3_2_6CCEE89B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC8060 push 8A240C8Ah; iretd 3_2_6CDC8096
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: section name: .sedata
            Source: SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllStatic PE information: section name: .sedata
            Source: initial sampleStatic PE information: section where entry point is pointing to: .sedata
            Source: initial sampleStatic PE information: section name: .sedata entropy: 7.114902610616691

            Boot Survival

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exeJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exeJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exeJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\System32\loaddll32.exeSpecial instruction interceptor: First address: 000000006CCF2D4C instructions caused by: Self-modifying code
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCEEAC9 second address: 000000006CCEEEF8 instructions: 0x00000000 rdtsc 0x00000002 mov dl, F2h 0x00000004 bswap ecx 0x00000006 call 00007FE5150D13DAh 0x0000000b jmp 00007FE5150D142Bh 0x0000000d lea ebx, dword ptr [ebx+55h] 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 bsr bp, cx 0x0000001b rcl ecx, 19h 0x0000001e xchg dword ptr [esp+04h], ebx 0x00000022 jmp 00007FE5150D185Bh 0x00000027 mov al, F1h 0x00000029 rcl bx, 1 0x0000002c inc bx 0x0000002e sub esp, 1Eh 0x00000031 ror ax, 0002h 0x00000035 lea esp, dword ptr [esp+02h] 0x00000039 jmp 00007FE5150D13C0h 0x0000003b push dword ptr [esp+20h] 0x0000003f retn 0024h 0x00000042 lea edi, dword ptr [esp+0Ch] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007FE5150D186Ah 0x0000004e sub esp, 000000B4h 0x00000054 mov ebp, esp 0x00000056 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB709 second address: 000000006CCFB85B instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 jmp 00007FE5151CE62Dh 0x00000007 mov dh, byte ptr [esp] 0x0000000a jmp 00007FE5151CE640h 0x0000000c mov ecx, edi 0x0000000e mov esi, dword ptr [ecx] 0x00000010 bsf ecx, ecx 0x00000013 jnp 00007FE5151CE5F3h 0x00000015 jmp 00007FE5151CE6A5h 0x0000001a mov al, 96h 0x0000001c xchg edx, ecx 0x0000001e add edi, 04h 0x00000021 jmp 00007FE5151CE5C9h 0x00000023 btc edx, esi 0x00000026 je 00007FE5151CE5F7h 0x00000028 bsr eax, edi 0x0000002b setnl dh 0x0000002e jmp 00007FE5151CE62Ch 0x00000030 push ebp 0x00000031 lea ecx, dword ptr [ecx+esi] 0x00000034 call 00007FE5151CE5F2h 0x00000039 mov ch, byte ptr [esp] 0x0000003c push esi 0x0000003d jmp 00007FE5151CE692h 0x00000042 and ebp, esi 0x00000044 jns 00007FE5151CE5DEh 0x00000046 mov cx, word ptr [esp] 0x0000004a mov cl, byte ptr [esp] 0x0000004d jmp 00007FE5151CE5EFh 0x0000004f dec ax 0x00000051 push edi 0x00000052 mov dx, 9280h 0x00000056 mov dx, B8F4h 0x0000005a jmp 00007FE5151CE628h 0x0000005c mov bp, word ptr [esp] 0x00000060 sbb ax, bp 0x00000063 jmp 00007FE5151CE659h 0x00000065 jnc 00007FE5151CE5CDh 0x00000067 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5150D13DFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5150D142Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5150D13E4h 0x0000001c jp 00007FE5150D1476h 0x0000001e pop ebp 0x0000001f mov ch, 2Fh 0x00000021 mov ax, BE00h 0x00000025 or eax, ebx 0x00000027 jnle 00007FE5150D13C1h 0x00000029 jle 00007FE5150D13A9h 0x0000002b add esp, 04h 0x0000002e jnbe 00007FE5150D142Bh 0x00000030 pushfd 0x00000031 mov cx, word ptr [esp+02h] 0x00000036 jmp 00007FE5150D13E4h 0x00000038 lea edi, dword ptr [ecx+ebx] 0x0000003b mov edi, dword ptr [esp+04h] 0x0000003f mov edx, 6C4C3A78h 0x00000044 push dx 0x00000046 jmp 00007FE5150D1410h 0x00000048 lea esp, dword ptr [esp+02h] 0x0000004c lea esp, dword ptr [esp+08h] 0x00000050 call 00007FE5150D1431h 0x00000055 mov ax, dx 0x00000058 mov cl, B9h 0x0000005a bt dx, bx 0x0000005e xchg dword ptr [esp], ecx 0x00000061 jmp 00007FE5150D13DEh 0x00000063 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB903 second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 sub edx, eax 0x00000004 mov ax, bx 0x00000007 add dx, dx 0x0000000a mov ah, E4h 0x0000000c jmp 00007FE5151CE628h 0x0000000e lea ecx, dword ptr [ecx-0000ED1Ch] 0x00000014 mov dx, AE09h 0x00000018 mov eax, dword ptr [esp] 0x0000001b btc ax, si 0x0000001f call 00007FE5151CE8CDh 0x00000024 xchg dword ptr [esp+04h], ecx 0x00000028 mov ch, byte ptr [esp] 0x0000002b jmp 00007FE5151CE443h 0x00000030 sub esp, 16h 0x00000033 mov ax, word ptr [esp+07h] 0x00000038 mov ecx, dword ptr [esp+12h] 0x0000003c add esp, 07h 0x0000003f lea esp, dword ptr [esp+03h] 0x00000043 push dword ptr [esp+10h] 0x00000047 retn 0014h 0x0000004a mov ebx, ebp 0x0000004c lea eax, dword ptr [esp+ecx] 0x0000004f setle ah 0x00000052 sets dl 0x00000055 call 00007FE5151CE5EFh 0x0000005a xchg cl, ch 0x0000005c pushad 0x0000005d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECBBE second address: 000000006CCECBE2 instructions: 0x00000000 rdtsc 0x00000002 mov al, bh 0x00000004 xchg dword ptr [esp+20h], esi 0x00000008 jmp 00007FE5150D141Ch 0x0000000a rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5151CE633h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5151CE5E3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5151CE6F0h 0x00000049 pushfd 0x0000004a mov dx, cx 0x0000004d mov dh, 56h 0x0000004f lea eax, dword ptr [ebx-03h] 0x00000052 lea ecx, dword ptr [ecx-0F5291AAh] 0x00000058 lea esp, dword ptr [esp+04h] 0x0000005c sub ebp, 1284C013h 0x00000062 call 00007FE5151CE62Ch 0x00000067 mov ecx, dword ptr [esp] 0x0000006a rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECCAF second address: 000000006CCECC9D instructions: 0x00000000 rdtsc 0x00000002 neg al 0x00000004 neg al 0x00000006 push sp 0x00000008 jmp 00007FE5150D13DFh 0x0000000a lea esp, dword ptr [esp+02h] 0x0000000e xchg dword ptr [esp], ebx 0x00000011 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECC9D second address: 000000006CCECCC5 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 93656786h 0x00000007 jmp 00007FE5151CE625h 0x00000009 mov edx, dword ptr [esp] 0x0000000c lea ebx, dword ptr [ebx-00000034h] 0x00000012 shr eax, 0Ch 0x00000015 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECE39 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D13BFh 0x00000004 xor ebp, 2D4823BBh 0x0000000a mov ah, byte ptr [esp] 0x0000000d clc 0x0000000e je 00007FE5150D13E0h 0x00000010 jne 00007FE5150D140Ah 0x00000012 mov eax, 09013DC9h 0x00000017 sub esp, 19h 0x0000001a lea esp, dword ptr [esp+01h] 0x0000001e jmp 00007FE5150D1486h 0x00000023 add ebp, dword ptr [esi] 0x00000025 lea eax, dword ptr [00000000h+edx*4] 0x0000002c xchg ch, cl 0x0000002e jmp 00007FE5150D13ADh 0x00000030 movzx ecx, byte ptr [ebp+00h] 0x00000034 jmp 00007FE5150D13DFh 0x00000036 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECE3D second address: 000000006CCECEB5 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 jnbe 00007FE5151CE646h 0x00000005 not ax 0x00000008 call 00007FE5151CE5F7h 0x0000000d mov ax, di 0x00000010 jmp 00007FE5151CE62Bh 0x00000012 mov edx, dword ptr [esp] 0x00000015 add esp, 02h 0x00000018 jmp 00007FE5151CE66Dh 0x0000001a jnle 00007FE5151CE5B9h 0x0000001c mov dl, dh 0x0000001e mov dh, byte ptr [esp+01h] 0x00000022 call 00007FE5151CE649h 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007FE5151CE5F6h 0x0000002d add cl, bl 0x0000002f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCED042 second address: 000000006CCED0C7 instructions: 0x00000000 rdtsc 0x00000002 btr eax, ebp 0x00000005 jnp 00007FE5150D1449h 0x00000007 mov dx, word ptr [esp] 0x0000000b jmp 00007FE5150D1432h 0x0000000d inc ebp 0x0000000e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCEDC6E second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 and cx, si 0x00000005 jnc 00007FE5151CE63Eh 0x00000007 jmp 00007FE5151CE5FAh 0x00000009 mov dx, word ptr [esp] 0x0000000d jmp 00007FE5151CE638h 0x0000000f sub esp, 02h 0x00000012 jne 00007FE5151CE651h 0x00000014 lea eax, dword ptr [esp+edi] 0x00000017 lea esp, dword ptr [esp+02h] 0x0000001b jmp 00007FE5151CE644h 0x0000001d lea eax, dword ptr [edi+50h] 0x00000020 xchg dx, cx 0x00000023 stc 0x00000024 jc 00007FE5151CE598h 0x00000026 push di 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007FE5151CE686h 0x0000002e cmp esi, eax 0x00000030 jmp 00007FE5151CE74Bh 0x00000035 jl 00007FE5151CE4DBh 0x0000003b jnl 00007FE5151CE4D5h 0x00000041 ja 00007FE5151CD721h 0x00000047 movzx ecx, byte ptr [ebp+00h] 0x0000004b jmp 00007FE5151CE5EFh 0x0000004d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFDBDC second address: 000000006CCFDDC5 instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 stc 0x00000004 jnc 00007FE5150D13C2h 0x00000006 shl bp, cl 0x00000009 jmp 00007FE5150D14A1h 0x0000000e push esi 0x0000000f xchg bp, ax 0x00000012 pushfd 0x00000013 jmp 00007FE5150D13B7h 0x00000015 inc bp 0x00000017 jnc 00007FE5150D13DAh 0x00000019 jc 00007FE5150D13D8h 0x0000001b push edi 0x0000001c xchg dh, dl 0x0000001e xchg dl, cl 0x00000020 jmp 00007FE5150D13E5h 0x00000022 sub esp, 00000000h 0x00000025 jbe 00007FE5150D141Ah 0x00000027 mov ecx, dword ptr [esp] 0x0000002a lea edx, dword ptr [esi+esi] 0x0000002d add dx, bx 0x00000030 jmp 00007FE5150D144Bh 0x00000032 pop ebp 0x00000033 sub esp, 03h 0x00000036 jbe 00007FE5150D13E3h 0x00000038 rol esi, cl 0x0000003a add esp, 01h 0x0000003d lea esp, dword ptr [esp+02h] 0x00000041 jmp 00007FE5150D15C9h 0x00000046 add esp, 04h 0x00000049 jno 00007FE5150D1388h 0x0000004b pop edi 0x0000004c rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8B7C second address: 000000006CCF8BB9 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [00000000h+esi*4] 0x00000009 neg cx 0x0000000c jmp 00007FE5151CE63Eh 0x0000000e lea eax, dword ptr [eax+ecx] 0x00000011 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8BB9 second address: 000000006CCF8B0F instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+04h] 0x00000006 retn 0008h 0x00000009 sub ebp, 04h 0x0000000c rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8B0F second address: 000000006CCF8C6A instructions: 0x00000000 rdtsc 0x00000002 xchg dh, ch 0x00000004 jmp 00007FE5151CE7ADh 0x00000009 not eax 0x0000000b not ax 0x0000000e mov edx, edi 0x00000010 mov ecx, dword ptr [edx] 0x00000012 jmp 00007FE5151CE5BFh 0x00000014 mov eax, edx 0x00000016 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8C6A second address: 000000006CCF8C3A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 jne 00007FE5150D13CDh 0x00000005 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCEEAC9 second address: 000000006CCEEEF8 instructions: 0x00000000 rdtsc 0x00000002 mov dl, F2h 0x00000004 bswap ecx 0x00000006 call 00007FE5151CE5EAh 0x0000000b jmp 00007FE5151CE63Bh 0x0000000d lea ebx, dword ptr [ebx+55h] 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 bsr bp, cx 0x0000001b rcl ecx, 19h 0x0000001e xchg dword ptr [esp+04h], ebx 0x00000022 jmp 00007FE5151CEA6Bh 0x00000027 mov al, F1h 0x00000029 rcl bx, 1 0x0000002c inc bx 0x0000002e sub esp, 1Eh 0x00000031 ror ax, 0002h 0x00000035 lea esp, dword ptr [esp+02h] 0x00000039 jmp 00007FE5151CE5D0h 0x0000003b push dword ptr [esp+20h] 0x0000003f retn 0024h 0x00000042 lea edi, dword ptr [esp+0Ch] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007FE5151CEA7Ah 0x0000004e sub esp, 000000B4h 0x00000054 mov ebp, esp 0x00000056 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF9089 second address: 000000006CCF907A instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 lea esi, dword ptr [esi-00000153h] 0x00000009 mov dh, BBh 0x0000000b mov dh, byte ptr [esp] 0x0000000e jmp 00007FE5150D13CFh 0x00000010 mov eax, 75B25F11h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c xchg dword ptr [esp+10h], esi 0x00000020 push edi 0x00000021 mov byte ptr [esp], al 0x00000024 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD034FB second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 call 00007FE5150D13E3h 0x00000008 push esp 0x00000009 mov esi, dword ptr [esp+03h] 0x0000000d bswap eax 0x0000000f mov byte ptr [esp+01h], cl 0x00000013 mov word ptr [esp+01h], sp 0x00000018 jmp 00007FE5150D1429h 0x0000001a xchg dword ptr [esp+04h], ebp 0x0000001e pushad 0x0000001f inc cx 0x00000021 bsf di, bx 0x00000025 pop esi 0x00000026 clc 0x00000027 jmp 00007FE5150D13DDh 0x00000029 lea ebp, dword ptr [ebp-0000003Ch] 0x0000002f mov cl, dl 0x00000031 bsr edi, ecx 0x00000034 cmc 0x00000035 cmc 0x00000036 jmp 00007FE5150D144Dh 0x00000038 xchg dword ptr [esp+20h], ebp 0x0000003c inc cl 0x0000003e cmc 0x0000003f setne dh 0x00000042 lea edi, dword ptr [ecx+ebp] 0x00000045 push dword ptr [esp+20h] 0x00000049 retn 0024h 0x0000004c bswap edx 0x0000004e jmp 00007FE5150D1474h 0x00000050 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5151CE5EFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5151CE63Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5151CE5F4h 0x0000001c jp 00007FE5151CE686h 0x0000001e pop ebp 0x0000001f mov ch, 2Fh 0x00000021 mov ax, BE00h 0x00000025 or eax, ebx 0x00000027 jnle 00007FE5151CE5D1h 0x00000029 jle 00007FE5151CE5B9h 0x0000002b add esp, 04h 0x0000002e jnbe 00007FE5151CE63Bh 0x00000030 pushfd 0x00000031 mov cx, word ptr [esp+02h] 0x00000036 jmp 00007FE5151CE5F4h 0x00000038 lea edi, dword ptr [ecx+ebx] 0x0000003b mov edi, dword ptr [esp+04h] 0x0000003f mov edx, 6C4C3A78h 0x00000044 push dx 0x00000046 jmp 00007FE5151CE620h 0x00000048 lea esp, dword ptr [esp+02h] 0x0000004c lea esp, dword ptr [esp+08h] 0x00000050 call 00007FE5151CE641h 0x00000055 mov ax, dx 0x00000058 mov cl, B9h 0x0000005a bt dx, bx 0x0000005e xchg dword ptr [esp], ecx 0x00000061 jmp 00007FE5151CE5EEh 0x00000063 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD0353D second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+000000CFh] 0x00000008 mov cl, ch 0x0000000a mov al, 0Ch 0x0000000c mov esi, eax 0x0000000e sub esp, 0Bh 0x00000011 jmp 00007FE5150D1424h 0x00000013 jle 00007FE5150D1420h 0x00000015 mov al, ah 0x00000017 lea esp, dword ptr [esp+03h] 0x0000001b jmp 00007FE5150D141Eh 0x0000001d jmp 00007FE5150D13E4h 0x0000001f add esp, 08h 0x00000022 jo 00007FE5150D1431h 0x00000024 jno 00007FE5150D142Fh 0x00000026 pop esi 0x00000027 xchg ch, al 0x00000029 pushfd 0x0000002a jmp 00007FE5150D13E6h 0x0000002c mov cl, 90h 0x0000002e bswap edx 0x00000030 jmp 00007FE5150D1418h 0x00000032 add esp, 04h 0x00000035 jmp 00007FE5150D151Eh 0x0000003a jne 00007FE5150D12E8h 0x00000040 pop ebp 0x00000041 mov di, word ptr [esp] 0x00000045 xchg ah, al 0x00000047 mov ah, 7Dh 0x00000049 jmp 00007FE5150D14BCh 0x0000004e bsr ax, bp 0x00000052 jnbe 00007FE5150D138Ch 0x00000054 pop edi 0x00000055 jmp 00007FE5150BA9BCh 0x0000005a mov ebx, ebp 0x0000005c lea eax, dword ptr [esp+ecx] 0x0000005f setle ah 0x00000062 sets dl 0x00000065 call 00007FE5150D13DFh 0x0000006a xchg cl, ch 0x0000006c pushad 0x0000006d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFBA9C second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 jmp 00007FE5150C27B9h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECCAF second address: 000000006CCECC9D instructions: 0x00000000 rdtsc 0x00000002 neg al 0x00000004 neg al 0x00000006 push sp 0x00000008 jmp 00007FE5151CE5EFh 0x0000000a lea esp, dword ptr [esp+02h] 0x0000000e xchg dword ptr [esp], ebx 0x00000011 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD01465 second address: 000000006CD0146C instructions: 0x00000000 rdtsc 0x00000002 not ah 0x00000004 ror cl, 00000000h 0x00000007 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD03196 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007FE5151CE738h 0x00000008 jo 00007FE5151CE4EEh 0x0000000e mov edx, 4C97B051h 0x00000013 neg edx 0x00000015 jmp 00007FE5151CE593h 0x00000017 mov eax, dword ptr [esi] 0x0000001a setnl dh 0x0000001d jmp 00007FE5151CE62Ch 0x0000001f mov dh, cl 0x00000021 call 00007FE5151CE5F4h 0x00000026 sub esi, 04h 0x00000029 mov edx, esi 0x0000002b lea edx, dword ptr [esp+esi] 0x0000002e pushfd 0x0000002f jmp 00007FE5151CE63Eh 0x00000031 btc ecx, ecx 0x00000034 jle 00007FE5151CE5F7h 0x00000036 jnle 00007FE5151CE5F5h 0x00000038 mov dword ptr [esi], eax 0x0000003a lea ecx, dword ptr [ebp+00003F07h] 0x00000040 bts cx, bx 0x00000044 jmp 00007FE5151CE699h 0x00000049 jc 00007FE5151CE598h 0x0000004b xchg dh, cl 0x0000004d mov dx, FA48h 0x00000051 jmp 00007FE5151CCBBCh 0x00000056 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECE3D second address: 000000006CCECEB5 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 jnbe 00007FE5150D1436h 0x00000005 not ax 0x00000008 call 00007FE5150D13E7h 0x0000000d mov ax, di 0x00000010 jmp 00007FE5150D141Bh 0x00000012 mov edx, dword ptr [esp] 0x00000015 add esp, 02h 0x00000018 jmp 00007FE5150D145Dh 0x0000001a jnle 00007FE5150D13A9h 0x0000001c mov dl, dh 0x0000001e mov dh, byte ptr [esp+01h] 0x00000022 call 00007FE5150D1439h 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007FE5150D13E6h 0x0000002d add cl, bl 0x0000002f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD01BCB second address: 000000006CD01E93 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 11h 0x00000005 mov word ptr [esp+07h], ax 0x0000000a inc dx 0x0000000c jmp 00007FE5151CE62Dh 0x0000000e lea esp, dword ptr [esp+01h] 0x00000012 lea edi, dword ptr [edi-0000002Bh] 0x00000018 bswap edx 0x0000001a adc edx, ecx 0x0000001c dec dh 0x0000001e setb ah 0x00000021 jmp 00007FE5151CEC5Fh 0x00000026 xchg dword ptr [esp+10h], edi 0x0000002a bsr eax, ecx 0x0000002d sub eax, esi 0x0000002f push dword ptr [esp+10h] 0x00000033 retn 0014h 0x00000036 mov edx, eax 0x00000038 mov eax, ebp 0x0000003a btr eax, ebp 0x0000003d jmp 00007FE5151CEA20h 0x00000042 jl 00007FE5151CE7AAh 0x00000048 mov eax, esi 0x0000004a inc cl 0x0000004c bsr dx, ax 0x00000050 jmp 00007FE5151CE269h 0x00000055 jnp 00007FE5151CE6EEh 0x0000005b mov edx, dword ptr [esp] 0x0000005e xchg eax, edx 0x0000005f jmp 00007FE5151CE4F1h 0x00000064 bsf edx, ebp 0x00000067 jmp 00007FE5151CE807h 0x0000006c pushad 0x0000006d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF9089 second address: 000000006CCF907A instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 lea esi, dword ptr [esi-00000153h] 0x00000009 mov dh, BBh 0x0000000b mov dh, byte ptr [esp] 0x0000000e jmp 00007FE5151CE5DFh 0x00000010 mov eax, 75B25F11h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c xchg dword ptr [esp+10h], esi 0x00000020 push edi 0x00000021 mov byte ptr [esp], al 0x00000024 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD0353D second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+000000CFh] 0x00000008 mov cl, ch 0x0000000a mov al, 0Ch 0x0000000c mov esi, eax 0x0000000e sub esp, 0Bh 0x00000011 jmp 00007FE5151CE634h 0x00000013 jle 00007FE5151CE630h 0x00000015 mov al, ah 0x00000017 lea esp, dword ptr [esp+03h] 0x0000001b jmp 00007FE5151CE62Eh 0x0000001d jmp 00007FE5151CE5F4h 0x0000001f add esp, 08h 0x00000022 jo 00007FE5151CE641h 0x00000024 jno 00007FE5151CE63Fh 0x00000026 pop esi 0x00000027 xchg ch, al 0x00000029 pushfd 0x0000002a jmp 00007FE5151CE5F6h 0x0000002c mov cl, 90h 0x0000002e bswap edx 0x00000030 jmp 00007FE5151CE628h 0x00000032 add esp, 04h 0x00000035 jmp 00007FE5151CE72Eh 0x0000003a jne 00007FE5151CE4F8h 0x00000040 pop ebp 0x00000041 mov di, word ptr [esp] 0x00000045 xchg ah, al 0x00000047 mov ah, 7Dh 0x00000049 jmp 00007FE5151CE6CCh 0x0000004e bsr ax, bp 0x00000052 jnbe 00007FE5151CE59Ch 0x00000054 pop edi 0x00000055 jmp 00007FE5151B7BCCh 0x0000005a mov ebx, ebp 0x0000005c lea eax, dword ptr [esp+ecx] 0x0000005f setle ah 0x00000062 sets dl 0x00000065 call 00007FE5151CE5EFh 0x0000006a xchg cl, ch 0x0000006c pushad 0x0000006d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD03196 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007FE5150D1528h 0x00000008 jo 00007FE5150D12DEh 0x0000000e mov edx, 4C97B051h 0x00000013 neg edx 0x00000015 jmp 00007FE5150D1383h 0x00000017 mov eax, dword ptr [esi] 0x0000001a setnl dh 0x0000001d jmp 00007FE5150D141Ch 0x0000001f mov dh, cl 0x00000021 call 00007FE5150D13E4h 0x00000026 sub esi, 04h 0x00000029 mov edx, esi 0x0000002b lea edx, dword ptr [esp+esi] 0x0000002e pushfd 0x0000002f jmp 00007FE5150D142Eh 0x00000031 btc ecx, ecx 0x00000034 jle 00007FE5150D13E7h 0x00000036 jnle 00007FE5150D13E5h 0x00000038 mov dword ptr [esi], eax 0x0000003a lea ecx, dword ptr [ebp+00003F07h] 0x00000040 bts cx, bx 0x00000044 jmp 00007FE5150D1489h 0x00000049 jc 00007FE5150D1388h 0x0000004b xchg dh, cl 0x0000004d mov dx, FA48h 0x00000051 jmp 00007FE5150CF9ACh 0x00000056 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD0345B second address: 000000006CD034FB instructions: 0x00000000 rdtsc 0x00000002 mov ch, bh 0x00000004 stc 0x00000005 mov eax, dword ptr [esp] 0x00000008 jmp 00007FE5150D1419h 0x0000000a mov dl, E0h 0x0000000c push dword ptr [esp+18h] 0x00000010 retn 001Ch 0x00000013 mov edi, dword ptr [ebp+00h] 0x00000016 lea eax, dword ptr [edx+ebx] 0x00000019 setnle cl 0x0000001c mov eax, B0A52D3Ah 0x00000021 jmp 00007FE5150D15E9h 0x00000026 push bx 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c add ebp, 04h 0x0000002f mov dx, word ptr [esp] 0x00000033 mov ecx, edx 0x00000035 jmp 00007FE5150D1345h 0x0000003a push esi 0x0000003b neg ah 0x0000003d jnle 00007FE5150D13A7h 0x0000003f not ch 0x00000041 cmc 0x00000042 jmp 00007FE5150D1382h 0x00000044 push edi 0x00000045 neg ecx 0x00000047 jne 00007FE5150D13E6h 0x00000049 jmp 00007FE5150D1454h 0x0000004b clc 0x0000004c rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD0345B second address: 000000006CD034FB instructions: 0x00000000 rdtsc 0x00000002 mov ch, bh 0x00000004 stc 0x00000005 mov eax, dword ptr [esp] 0x00000008 jmp 00007FE5151CE629h 0x0000000a mov dl, E0h 0x0000000c push dword ptr [esp+18h] 0x00000010 retn 001Ch 0x00000013 mov edi, dword ptr [ebp+00h] 0x00000016 lea eax, dword ptr [edx+ebx] 0x00000019 setnle cl 0x0000001c mov eax, B0A52D3Ah 0x00000021 jmp 00007FE5151CE7F9h 0x00000026 push bx 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c add ebp, 04h 0x0000002f mov dx, word ptr [esp] 0x00000033 mov ecx, edx 0x00000035 jmp 00007FE5151CE555h 0x0000003a push esi 0x0000003b neg ah 0x0000003d jnle 00007FE5151CE5B7h 0x0000003f not ch 0x00000041 cmc 0x00000042 jmp 00007FE5151CE592h 0x00000044 push edi 0x00000045 neg ecx 0x00000047 jne 00007FE5151CE5F6h 0x00000049 jmp 00007FE5151CE664h 0x0000004b clc 0x0000004c rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFAD3A second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+ebx*4] 0x00000009 mov ecx, D5B43DB6h 0x0000000e jmp 00007FE5150C3289h 0x00000013 mov ebx, ebp 0x00000015 lea eax, dword ptr [esp+ecx] 0x00000018 setle ah 0x0000001b sets dl 0x0000001e call 00007FE5150D13DFh 0x00000023 xchg cl, ch 0x00000025 pushad 0x00000026 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFAD3A second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+ebx*4] 0x00000009 mov ecx, D5B43DB6h 0x0000000e jmp 00007FE5151C0499h 0x00000013 mov ebx, ebp 0x00000015 lea eax, dword ptr [esp+ecx] 0x00000018 setle ah 0x0000001b sets dl 0x0000001e call 00007FE5151CE5EFh 0x00000023 xchg cl, ch 0x00000025 pushad 0x00000026 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD0457D second address: 000000006CD0457F instructions: 0x00000000 rdtsc 0x00000002 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFE1D1 second address: 000000006CCFE3D9 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 xchg word ptr [esp], ax 0x00000007 lea ecx, dword ptr [ecx+esi] 0x0000000a xchg dword ptr [esp+04h], esi 0x0000000e jmp 00007FE5150D1406h 0x00000010 cmc 0x00000011 neg al 0x00000013 dec cx 0x00000015 lea ecx, dword ptr [00000000h+edi*4] 0x0000001c mov eax, 63E4BEA4h 0x00000021 jmp 00007FE5150D15E0h 0x00000026 lea esi, dword ptr [esi+2Ah] 0x00000029 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD121EC second address: 000000006CD121EE instructions: 0x00000000 rdtsc 0x00000002 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB709 second address: 000000006CCFB85B instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 jmp 00007FE5150D141Dh 0x00000007 mov dh, byte ptr [esp] 0x0000000a jmp 00007FE5150D1430h 0x0000000c mov ecx, edi 0x0000000e mov esi, dword ptr [ecx] 0x00000010 bsf ecx, ecx 0x00000013 jnp 00007FE5150D13E3h 0x00000015 jmp 00007FE5150D1495h 0x0000001a mov al, 96h 0x0000001c xchg edx, ecx 0x0000001e add edi, 04h 0x00000021 jmp 00007FE5150D13B9h 0x00000023 btc edx, esi 0x00000026 je 00007FE5150D13E7h 0x00000028 bsr eax, edi 0x0000002b setnl dh 0x0000002e jmp 00007FE5150D141Ch 0x00000030 push ebp 0x00000031 lea ecx, dword ptr [ecx+esi] 0x00000034 call 00007FE5150D13E2h 0x00000039 mov ch, byte ptr [esp] 0x0000003c push esi 0x0000003d jmp 00007FE5150D1482h 0x00000042 and ebp, esi 0x00000044 jns 00007FE5150D13CEh 0x00000046 mov cx, word ptr [esp] 0x0000004a mov cl, byte ptr [esp] 0x0000004d jmp 00007FE5150D13DFh 0x0000004f dec ax 0x00000051 push edi 0x00000052 mov dx, 9280h 0x00000056 mov dx, B8F4h 0x0000005a jmp 00007FE5150D1418h 0x0000005c mov bp, word ptr [esp] 0x00000060 sbb ax, bp 0x00000063 jmp 00007FE5150D1449h 0x00000065 jnc 00007FE5150D13BDh 0x00000067 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB903 second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 sub edx, eax 0x00000004 mov ax, bx 0x00000007 add dx, dx 0x0000000a mov ah, E4h 0x0000000c jmp 00007FE5150D1418h 0x0000000e lea ecx, dword ptr [ecx-0000ED1Ch] 0x00000014 mov dx, AE09h 0x00000018 mov eax, dword ptr [esp] 0x0000001b btc ax, si 0x0000001f call 00007FE5150D16BDh 0x00000024 xchg dword ptr [esp+04h], ecx 0x00000028 mov ch, byte ptr [esp] 0x0000002b jmp 00007FE5150D1233h 0x00000030 sub esp, 16h 0x00000033 mov ax, word ptr [esp+07h] 0x00000038 mov ecx, dword ptr [esp+12h] 0x0000003c add esp, 07h 0x0000003f lea esp, dword ptr [esp+03h] 0x00000043 push dword ptr [esp+10h] 0x00000047 retn 0014h 0x0000004a mov ebx, ebp 0x0000004c lea eax, dword ptr [esp+ecx] 0x0000004f setle ah 0x00000052 sets dl 0x00000055 call 00007FE5150D13DFh 0x0000005a xchg cl, ch 0x0000005c pushad 0x0000005d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECBBE second address: 000000006CCECBE2 instructions: 0x00000000 rdtsc 0x00000002 mov al, bh 0x00000004 xchg dword ptr [esp+20h], esi 0x00000008 jmp 00007FE5151CE62Ch 0x0000000a rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5150D1423h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5150D13D3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5150D14E0h 0x00000049 jl 00007FE5150D14BCh 0x0000004f pushfd 0x00000050 mov dx, cx 0x00000053 mov dh, 56h 0x00000055 jmp 00007FE5150D1471h 0x00000057 lea eax, dword ptr [ebx-03h] 0x0000005a lea ecx, dword ptr [ecx-0F5291AAh] 0x00000060 jmp 00007FE5150D13ADh 0x00000062 lea esp, dword ptr [esp+04h] 0x00000066 sub ebp, 1284C013h 0x0000006c call 00007FE5150D141Ch 0x00000071 mov ecx, dword ptr [esp] 0x00000074 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECC9D second address: 000000006CCECCC5 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 93656786h 0x00000007 jmp 00007FE5150D1415h 0x00000009 mov edx, dword ptr [esp] 0x0000000c lea ebx, dword ptr [ebx-00000034h] 0x00000012 shr eax, 0Ch 0x00000015 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECE39 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE5CFh 0x00000004 xor ebp, 2D4823BBh 0x0000000a mov ah, byte ptr [esp] 0x0000000d clc 0x0000000e je 00007FE5151CE5F0h 0x00000010 jne 00007FE5151CE61Ah 0x00000012 mov eax, 09013DC9h 0x00000017 sub esp, 19h 0x0000001a lea esp, dword ptr [esp+01h] 0x0000001e jmp 00007FE5151CE696h 0x00000023 add ebp, dword ptr [esi] 0x00000025 lea eax, dword ptr [00000000h+edx*4] 0x0000002c xchg ch, cl 0x0000002e jmp 00007FE5151CE5BDh 0x00000030 movzx ecx, byte ptr [ebp+00h] 0x00000034 jmp 00007FE5151CE5EFh 0x00000036 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCED042 second address: 000000006CCED0C7 instructions: 0x00000000 rdtsc 0x00000002 btr eax, ebp 0x00000005 jnp 00007FE5151CE659h 0x00000007 mov dx, word ptr [esp] 0x0000000b jmp 00007FE5151CE642h 0x0000000d inc ebp 0x0000000e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCEDC6E second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 and cx, si 0x00000005 jnc 00007FE5150D142Eh 0x00000007 jmp 00007FE5150D13EAh 0x00000009 mov dx, word ptr [esp] 0x0000000d jmp 00007FE5150D1428h 0x0000000f sub esp, 02h 0x00000012 jne 00007FE5150D1441h 0x00000014 lea eax, dword ptr [esp+edi] 0x00000017 lea esp, dword ptr [esp+02h] 0x0000001b jmp 00007FE5150D1434h 0x0000001d lea eax, dword ptr [edi+50h] 0x00000020 xchg dx, cx 0x00000023 stc 0x00000024 jc 00007FE5150D1388h 0x00000026 push di 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007FE5150D1476h 0x0000002e cmp esi, eax 0x00000030 jmp 00007FE5150D153Bh 0x00000035 jl 00007FE5150D12CBh 0x0000003b jnl 00007FE5150D12C5h 0x00000041 ja 00007FE5150D0511h 0x00000047 movzx ecx, byte ptr [ebp+00h] 0x0000004b jmp 00007FE5150D13DFh 0x0000004d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFDBDC second address: 000000006CCFDDC5 instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 stc 0x00000004 jnc 00007FE5151CE5D2h 0x00000006 shl bp, cl 0x00000009 jmp 00007FE5151CE6B1h 0x0000000e push esi 0x0000000f xchg bp, ax 0x00000012 pushfd 0x00000013 jmp 00007FE5151CE5C7h 0x00000015 inc bp 0x00000017 jnc 00007FE5151CE5EAh 0x00000019 jc 00007FE5151CE5E8h 0x0000001b push edi 0x0000001c xchg dh, dl 0x0000001e xchg dl, cl 0x00000020 jmp 00007FE5151CE5F5h 0x00000022 sub esp, 00000000h 0x00000025 jbe 00007FE5151CE62Ah 0x00000027 mov ecx, dword ptr [esp] 0x0000002a lea edx, dword ptr [esi+esi] 0x0000002d add dx, bx 0x00000030 jmp 00007FE5151CE65Bh 0x00000032 pop ebp 0x00000033 sub esp, 03h 0x00000036 jbe 00007FE5151CE5F3h 0x00000038 rol esi, cl 0x0000003a add esp, 01h 0x0000003d lea esp, dword ptr [esp+02h] 0x00000041 jmp 00007FE5151CE7D9h 0x00000046 add esp, 04h 0x00000049 jno 00007FE5151CE598h 0x0000004b pop edi 0x0000004c rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8B7C second address: 000000006CCF8BB9 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [00000000h+esi*4] 0x00000009 neg cx 0x0000000c jmp 00007FE5150D142Eh 0x0000000e lea eax, dword ptr [eax+ecx] 0x00000011 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8B0F second address: 000000006CCF8C6A instructions: 0x00000000 rdtsc 0x00000002 xchg dh, ch 0x00000004 jmp 00007FE5150D159Dh 0x00000009 not eax 0x0000000b not ax 0x0000000e mov edx, edi 0x00000010 mov ecx, dword ptr [edx] 0x00000012 jmp 00007FE5150D13AFh 0x00000014 mov eax, edx 0x00000016 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCF8C6A second address: 000000006CCF8C3A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 jne 00007FE5151CE5DDh 0x00000005 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD034FB second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 call 00007FE5151CE5F3h 0x00000008 push esp 0x00000009 mov esi, dword ptr [esp+03h] 0x0000000d bswap eax 0x0000000f mov byte ptr [esp+01h], cl 0x00000013 mov word ptr [esp+01h], sp 0x00000018 jmp 00007FE5151CE639h 0x0000001a xchg dword ptr [esp+04h], ebp 0x0000001e pushad 0x0000001f inc cx 0x00000021 bsf di, bx 0x00000025 pop esi 0x00000026 clc 0x00000027 jmp 00007FE5151CE5EDh 0x00000029 lea ebp, dword ptr [ebp-0000003Ch] 0x0000002f mov cl, dl 0x00000031 bsr edi, ecx 0x00000034 cmc 0x00000035 cmc 0x00000036 jmp 00007FE5151CE65Dh 0x00000038 xchg dword ptr [esp+20h], ebp 0x0000003c inc cl 0x0000003e cmc 0x0000003f setne dh 0x00000042 lea edi, dword ptr [ecx+ebp] 0x00000045 push dword ptr [esp+20h] 0x00000049 retn 0024h 0x0000004c bswap edx 0x0000004e jmp 00007FE5151CE684h 0x00000050 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFBA9C second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 jmp 00007FE5151BF9C9h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5151CE5EFh 0x00000010 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD01BCB second address: 000000006CD01E93 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 11h 0x00000005 mov word ptr [esp+07h], ax 0x0000000a inc dx 0x0000000c jmp 00007FE5150D141Dh 0x0000000e lea esp, dword ptr [esp+01h] 0x00000012 lea edi, dword ptr [edi-0000002Bh] 0x00000018 bswap edx 0x0000001a adc edx, ecx 0x0000001c dec dh 0x0000001e setb ah 0x00000021 jmp 00007FE5150D1A4Fh 0x00000026 xchg dword ptr [esp+10h], edi 0x0000002a bsr eax, ecx 0x0000002d sub eax, esi 0x0000002f push dword ptr [esp+10h] 0x00000033 retn 0014h 0x00000036 mov edx, eax 0x00000038 mov eax, ebp 0x0000003a btr eax, ebp 0x0000003d jmp 00007FE5150D1810h 0x00000042 jl 00007FE5150D159Ah 0x00000048 mov eax, esi 0x0000004a inc cl 0x0000004c bsr dx, ax 0x00000050 jmp 00007FE5150D1059h 0x00000055 jnp 00007FE5150D14DEh 0x0000005b mov edx, dword ptr [esp] 0x0000005e xchg eax, edx 0x0000005f jmp 00007FE5150D12E1h 0x00000064 bsf edx, ebp 0x00000067 jmp 00007FE5150D15F7h 0x0000006c pushad 0x0000006d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCEA7C8 second address: 000000006CCEA807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE5ECh 0x00000004 sub esp, 000000A0h 0x0000000a call 00007FE5151CE665h 0x0000000f setno bl 0x00000012 mov al, byte ptr [esp] 0x00000015 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD039C4 second address: 000000006CD039F9 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 jmp 00007FE5150D13D5h 0x00000008 lea ebp, dword ptr [ebp-00000520h] 0x0000000e xchg eax, edx 0x0000000f lea eax, dword ptr [00000000h+ecx*4] 0x00000016 jmp 00007FE5150D143Ch 0x00000018 mov dx, bp 0x0000001b lea eax, dword ptr [edi+ebp] 0x0000001e not eax 0x00000020 xchg dword ptr [esp+3Ch], ebp 0x00000024 bsf dx, di 0x00000028 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFE1D1 second address: 000000006CCFE3D9 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 xchg word ptr [esp], ax 0x00000007 lea ecx, dword ptr [ecx+esi] 0x0000000a xchg dword ptr [esp+04h], esi 0x0000000e jmp 00007FE5151CE616h 0x00000010 cmc 0x00000011 neg al 0x00000013 dec cx 0x00000015 lea ecx, dword ptr [00000000h+edi*4] 0x0000001c mov eax, 63E4BEA4h 0x00000021 jmp 00007FE5151CE7F0h 0x00000026 lea esi, dword ptr [esi+2Ah] 0x00000029 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCEA7C8 second address: 000000006CCEA807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D13DCh 0x00000004 sub esp, 000000A0h 0x0000000a call 00007FE5150D1455h 0x0000000f setno bl 0x00000012 mov al, byte ptr [esp] 0x00000015 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD039C4 second address: 000000006CD039F9 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 jmp 00007FE5151CE5E5h 0x00000008 lea ebp, dword ptr [ebp-00000520h] 0x0000000e xchg eax, edx 0x0000000f lea eax, dword ptr [00000000h+ecx*4] 0x00000016 jmp 00007FE5151CE64Ch 0x00000018 mov dx, bp 0x0000001b lea eax, dword ptr [edi+ebp] 0x0000001e not eax 0x00000020 xchg dword ptr [esp+3Ch], ebp 0x00000024 bsf dx, di 0x00000028 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A396 second address: 000000006CD3A359 instructions: 0x00000000 rdtsc 0x00000002 bswap ecx 0x00000004 mov dh, byte ptr [esp] 0x00000007 jmp 00007FE5151CE4E8h 0x0000000c add esi, 02h 0x0000000f btr cx, ax 0x00000013 jno 00007FE5151CE6EDh 0x00000019 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A359 second address: 000000006CD3A2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1351h 0x00000007 not cl 0x00000009 call 00007FE5150D144Dh 0x0000000e lea edx, dword ptr [00000000h+esi*4] 0x00000015 mov cx, E8B9h 0x00000019 rcl dx, cl 0x0000001c btc cx, ax 0x00000020 xchg al, cl 0x00000022 jmp 00007FE5150D13C9h 0x00000024 xchg dword ptr [esp], edi 0x00000027 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A2DB second address: 000000006CD3A2D0 instructions: 0x00000000 rdtsc 0x00000002 btc eax, ebx 0x00000005 mov eax, edx 0x00000007 xchg ch, ah 0x00000009 lea edi, dword ptr [edi-0004D459h] 0x0000000f jmp 00007FE5151CE5E8h 0x00000011 mov eax, edi 0x00000013 mov dx, EA8Dh 0x00000017 lea ecx, dword ptr [ebx+52h] 0x0000001a xchg dword ptr [esp], edi 0x0000001d bswap edx 0x0000001f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A2D0 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1455h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCEEAC9 second address: 000000006CCEEEF8 instructions: 0x00000000 rdtsc 0x00000002 mov dl, F2h 0x00000004 bswap ecx 0x00000006 call 00007FE5150D13DAh 0x0000000b jmp 00007FE5150D142Bh 0x0000000d lea ebx, dword ptr [ebx+55h] 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 bsr bp, cx 0x0000001b rcl ecx, 19h 0x0000001e xchg dword ptr [esp+04h], ebx 0x00000022 jmp 00007FE5150D185Bh 0x00000027 mov al, F1h 0x00000029 rcl bx, 1 0x0000002c inc bx 0x0000002e sub esp, 1Eh 0x00000031 ror ax, 0002h 0x00000035 lea esp, dword ptr [esp+02h] 0x00000039 jmp 00007FE5150D13C0h 0x0000003b push dword ptr [esp+20h] 0x0000003f retn 0024h 0x00000042 lea edi, dword ptr [esp+0Ch] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007FE5150D186Ah 0x0000004e sub esp, 000000B4h 0x00000054 mov ebp, esp 0x00000056 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFB709 second address: 000000006CCFB85B instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 jmp 00007FE5151CE62Dh 0x00000007 mov dh, byte ptr [esp] 0x0000000a jmp 00007FE5151CE640h 0x0000000c mov ecx, edi 0x0000000e mov esi, dword ptr [ecx] 0x00000010 bsf ecx, ecx 0x00000013 jnp 00007FE5151CE5F3h 0x00000015 jmp 00007FE5151CE6A5h 0x0000001a mov al, 96h 0x0000001c xchg edx, ecx 0x0000001e add edi, 04h 0x00000021 jmp 00007FE5151CE5C9h 0x00000023 btc edx, esi 0x00000026 je 00007FE5151CE5F7h 0x00000028 bsr eax, edi 0x0000002b setnl dh 0x0000002e jmp 00007FE5151CE62Ch 0x00000030 push ebp 0x00000031 lea ecx, dword ptr [ecx+esi] 0x00000034 call 00007FE5151CE5F2h 0x00000039 mov ch, byte ptr [esp] 0x0000003c push esi 0x0000003d jmp 00007FE5151CE692h 0x00000042 and ebp, esi 0x00000044 jns 00007FE5151CE5DEh 0x00000046 mov cx, word ptr [esp] 0x0000004a mov cl, byte ptr [esp] 0x0000004d jmp 00007FE5151CE5EFh 0x0000004f dec ax 0x00000051 push edi 0x00000052 mov dx, 9280h 0x00000056 mov dx, B8F4h 0x0000005a jmp 00007FE5151CE628h 0x0000005c mov bp, word ptr [esp] 0x00000060 sbb ax, bp 0x00000063 jmp 00007FE5151CE659h 0x00000065 jnc 00007FE5151CE5CDh 0x00000067 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5150D13DFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5150D142Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5150D13E4h 0x0000001c jp 00007FE5150D1476h 0x0000001e pop ebp 0x0000001f mov ch, 2Fh 0x00000021 mov ax, BE00h 0x00000025 or eax, ebx 0x00000027 jnle 00007FE5150D13C1h 0x00000029 jle 00007FE5150D13A9h 0x0000002b add esp, 04h 0x0000002e jnbe 00007FE5150D142Bh 0x00000030 pushfd 0x00000031 mov cx, word ptr [esp+02h] 0x00000036 jmp 00007FE5150D13E4h 0x00000038 lea edi, dword ptr [ecx+ebx] 0x0000003b mov edi, dword ptr [esp+04h] 0x0000003f mov edx, 6C4C3A78h 0x00000044 push dx 0x00000046 jmp 00007FE5150D1410h 0x00000048 lea esp, dword ptr [esp+02h] 0x0000004c lea esp, dword ptr [esp+08h] 0x00000050 call 00007FE5150D1431h 0x00000055 mov ax, dx 0x00000058 mov cl, B9h 0x0000005a bt dx, bx 0x0000005e xchg dword ptr [esp], ecx 0x00000061 jmp 00007FE5150D13DEh 0x00000063 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFB903 second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 sub edx, eax 0x00000004 mov ax, bx 0x00000007 add dx, dx 0x0000000a mov ah, E4h 0x0000000c jmp 00007FE5151CE628h 0x0000000e lea ecx, dword ptr [ecx-0000ED1Ch] 0x00000014 mov dx, AE09h 0x00000018 mov eax, dword ptr [esp] 0x0000001b btc ax, si 0x0000001f call 00007FE5151CE8CDh 0x00000024 xchg dword ptr [esp+04h], ecx 0x00000028 mov ch, byte ptr [esp] 0x0000002b jmp 00007FE5151CE443h 0x00000030 sub esp, 16h 0x00000033 mov ax, word ptr [esp+07h] 0x00000038 mov ecx, dword ptr [esp+12h] 0x0000003c add esp, 07h 0x0000003f lea esp, dword ptr [esp+03h] 0x00000043 push dword ptr [esp+10h] 0x00000047 retn 0014h 0x0000004a mov ebx, ebp 0x0000004c lea eax, dword ptr [esp+ecx] 0x0000004f setle ah 0x00000052 sets dl 0x00000055 call 00007FE5151CE5EFh 0x0000005a xchg cl, ch 0x0000005c pushad 0x0000005d rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCECBBE second address: 000000006CCECBE2 instructions: 0x00000000 rdtsc 0x00000002 mov al, bh 0x00000004 xchg dword ptr [esp+20h], esi 0x00000008 jmp 00007FE5150D141Ch 0x0000000a rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5151CE633h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5151CE5E3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5151CE6F0h 0x00000049 pushfd 0x0000004a mov dx, cx 0x0000004d mov dh, 56h 0x0000004f lea eax, dword ptr [ebx-03h] 0x00000052 lea ecx, dword ptr [ecx-0F5291AAh] 0x00000058 lea esp, dword ptr [esp+04h] 0x0000005c sub ebp, 1284C013h 0x00000062 call 00007FE5151CE62Ch 0x00000067 mov ecx, dword ptr [esp] 0x0000006a rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCECCAF second address: 000000006CCECC9D instructions: 0x00000000 rdtsc 0x00000002 neg al 0x00000004 neg al 0x00000006 push sp 0x00000008 jmp 00007FE5150D13DFh 0x0000000a lea esp, dword ptr [esp+02h] 0x0000000e xchg dword ptr [esp], ebx 0x00000011 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCECC9D second address: 000000006CCECCC5 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 93656786h 0x00000007 jmp 00007FE5151CE625h 0x00000009 mov edx, dword ptr [esp] 0x0000000c lea ebx, dword ptr [ebx-00000034h] 0x00000012 shr eax, 0Ch 0x00000015 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCECE39 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D13BFh 0x00000004 xor ebp, 2D4823BBh 0x0000000a mov ah, byte ptr [esp] 0x0000000d clc 0x0000000e je 00007FE5150D13E0h 0x00000010 jne 00007FE5150D140Ah 0x00000012 mov eax, 09013DC9h 0x00000017 sub esp, 19h 0x0000001a lea esp, dword ptr [esp+01h] 0x0000001e jmp 00007FE5150D1486h 0x00000023 add ebp, dword ptr [esi] 0x00000025 lea eax, dword ptr [00000000h+edx*4] 0x0000002c xchg ch, cl 0x0000002e jmp 00007FE5150D13ADh 0x00000030 movzx ecx, byte ptr [ebp+00h] 0x00000034 jmp 00007FE5150D13DFh 0x00000036 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCECE3D second address: 000000006CCECEB5 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 jnbe 00007FE5151CE646h 0x00000005 not ax 0x00000008 call 00007FE5151CE5F7h 0x0000000d mov ax, di 0x00000010 jmp 00007FE5151CE62Bh 0x00000012 mov edx, dword ptr [esp] 0x00000015 add esp, 02h 0x00000018 jmp 00007FE5151CE66Dh 0x0000001a jnle 00007FE5151CE5B9h 0x0000001c mov dl, dh 0x0000001e mov dh, byte ptr [esp+01h] 0x00000022 call 00007FE5151CE649h 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007FE5151CE5F6h 0x0000002d add cl, bl 0x0000002f rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCED042 second address: 000000006CCED0C7 instructions: 0x00000000 rdtsc 0x00000002 btr eax, ebp 0x00000005 jnp 00007FE5150D1449h 0x00000007 mov dx, word ptr [esp] 0x0000000b jmp 00007FE5150D1432h 0x0000000d inc ebp 0x0000000e rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCEDC6E second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 and cx, si 0x00000005 jnc 00007FE5151CE63Eh 0x00000007 jmp 00007FE5151CE5FAh 0x00000009 mov dx, word ptr [esp] 0x0000000d jmp 00007FE5151CE638h 0x0000000f sub esp, 02h 0x00000012 jne 00007FE5151CE651h 0x00000014 lea eax, dword ptr [esp+edi] 0x00000017 lea esp, dword ptr [esp+02h] 0x0000001b jmp 00007FE5151CE644h 0x0000001d lea eax, dword ptr [edi+50h] 0x00000020 xchg dx, cx 0x00000023 stc 0x00000024 jc 00007FE5151CE598h 0x00000026 push di 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007FE5151CE686h 0x0000002e cmp esi, eax 0x00000030 jmp 00007FE5151CE74Bh 0x00000035 jl 00007FE5151CE4DBh 0x0000003b jnl 00007FE5151CE4D5h 0x00000041 ja 00007FE5151CD721h 0x00000047 movzx ecx, byte ptr [ebp+00h] 0x0000004b jmp 00007FE5151CE5EFh 0x0000004d rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFDBDC second address: 000000006CCFDDC5 instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 stc 0x00000004 jnc 00007FE5150D13C2h 0x00000006 shl bp, cl 0x00000009 jmp 00007FE5150D14A1h 0x0000000e push esi 0x0000000f xchg bp, ax 0x00000012 pushfd 0x00000013 jmp 00007FE5150D13B7h 0x00000015 inc bp 0x00000017 jnc 00007FE5150D13DAh 0x00000019 jc 00007FE5150D13D8h 0x0000001b push edi 0x0000001c xchg dh, dl 0x0000001e xchg dl, cl 0x00000020 jmp 00007FE5150D13E5h 0x00000022 sub esp, 00000000h 0x00000025 jbe 00007FE5150D141Ah 0x00000027 mov ecx, dword ptr [esp] 0x0000002a lea edx, dword ptr [esi+esi] 0x0000002d add dx, bx 0x00000030 jmp 00007FE5150D144Bh 0x00000032 pop ebp 0x00000033 sub esp, 03h 0x00000036 jbe 00007FE5150D13E3h 0x00000038 rol esi, cl 0x0000003a add esp, 01h 0x0000003d lea esp, dword ptr [esp+02h] 0x00000041 jmp 00007FE5150D15C9h 0x00000046 add esp, 04h 0x00000049 jno 00007FE5150D1388h 0x0000004b pop edi 0x0000004c rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCF8B7C second address: 000000006CCF8BB9 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [00000000h+esi*4] 0x00000009 neg cx 0x0000000c jmp 00007FE5151CE63Eh 0x0000000e lea eax, dword ptr [eax+ecx] 0x00000011 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCF8BB9 second address: 000000006CCF8B0F instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+04h] 0x00000006 retn 0008h 0x00000009 sub ebp, 04h 0x0000000c rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCF8B0F second address: 000000006CCF8C6A instructions: 0x00000000 rdtsc 0x00000002 xchg dh, ch 0x00000004 jmp 00007FE5151CE7ADh 0x00000009 not eax 0x0000000b not ax 0x0000000e mov edx, edi 0x00000010 mov ecx, dword ptr [edx] 0x00000012 jmp 00007FE5151CE5BFh 0x00000014 mov eax, edx 0x00000016 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCF8C6A second address: 000000006CCF8C3A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 jne 00007FE5150D13CDh 0x00000005 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCF9089 second address: 000000006CCF907A instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 lea esi, dword ptr [esi-00000153h] 0x00000009 mov dh, BBh 0x0000000b mov dh, byte ptr [esp] 0x0000000e jmp 00007FE5151CE5DFh 0x00000010 mov eax, 75B25F11h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c xchg dword ptr [esp+10h], esi 0x00000020 push edi 0x00000021 mov byte ptr [esp], al 0x00000024 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD034FB second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 call 00007FE5150D13E3h 0x00000008 push esp 0x00000009 mov esi, dword ptr [esp+03h] 0x0000000d bswap eax 0x0000000f mov byte ptr [esp+01h], cl 0x00000013 mov word ptr [esp+01h], sp 0x00000018 jmp 00007FE5150D1429h 0x0000001a xchg dword ptr [esp+04h], ebp 0x0000001e pushad 0x0000001f inc cx 0x00000021 bsf di, bx 0x00000025 pop esi 0x00000026 clc 0x00000027 jmp 00007FE5150D13DDh 0x00000029 lea ebp, dword ptr [ebp-0000003Ch] 0x0000002f mov cl, dl 0x00000031 bsr edi, ecx 0x00000034 cmc 0x00000035 cmc 0x00000036 jmp 00007FE5150D144Dh 0x00000038 xchg dword ptr [esp+20h], ebp 0x0000003c inc cl 0x0000003e cmc 0x0000003f setne dh 0x00000042 lea edi, dword ptr [ecx+ebp] 0x00000045 push dword ptr [esp+20h] 0x00000049 retn 0024h 0x0000004c bswap edx 0x0000004e jmp 00007FE5150D1474h 0x00000050 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD0353D second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+000000CFh] 0x00000008 mov cl, ch 0x0000000a mov al, 0Ch 0x0000000c mov esi, eax 0x0000000e sub esp, 0Bh 0x00000011 jmp 00007FE5151CE634h 0x00000013 jle 00007FE5151CE630h 0x00000015 mov al, ah 0x00000017 lea esp, dword ptr [esp+03h] 0x0000001b jmp 00007FE5151CE62Eh 0x0000001d jmp 00007FE5151CE5F4h 0x0000001f add esp, 08h 0x00000022 jo 00007FE5151CE641h 0x00000024 jno 00007FE5151CE63Fh 0x00000026 pop esi 0x00000027 xchg ch, al 0x00000029 pushfd 0x0000002a jmp 00007FE5151CE5F6h 0x0000002c mov cl, 90h 0x0000002e bswap edx 0x00000030 jmp 00007FE5151CE628h 0x00000032 add esp, 04h 0x00000035 jmp 00007FE5151CE72Eh 0x0000003a jne 00007FE5151CE4F8h 0x00000040 pop ebp 0x00000041 mov di, word ptr [esp] 0x00000045 xchg ah, al 0x00000047 mov ah, 7Dh 0x00000049 jmp 00007FE5151CE6CCh 0x0000004e bsr ax, bp 0x00000052 jnbe 00007FE5151CE59Ch 0x00000054 pop edi 0x00000055 jmp 00007FE5151B7BCCh 0x0000005a mov ebx, ebp 0x0000005c lea eax, dword ptr [esp+ecx] 0x0000005f setle ah 0x00000062 sets dl 0x00000065 call 00007FE5151CE5EFh 0x0000006a xchg cl, ch 0x0000006c pushad 0x0000006d rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFBA9C second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 jmp 00007FE5150C27B9h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD01465 second address: 000000006CD0146C instructions: 0x00000000 rdtsc 0x00000002 not ah 0x00000004 ror cl, 00000000h 0x00000007 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD03196 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007FE5150D1528h 0x00000008 jo 00007FE5150D12DEh 0x0000000e mov edx, 4C97B051h 0x00000013 neg edx 0x00000015 jmp 00007FE5150D1383h 0x00000017 mov eax, dword ptr [esi] 0x0000001a setnl dh 0x0000001d jmp 00007FE5150D141Ch 0x0000001f mov dh, cl 0x00000021 call 00007FE5150D13E4h 0x00000026 sub esi, 04h 0x00000029 mov edx, esi 0x0000002b lea edx, dword ptr [esp+esi] 0x0000002e pushfd 0x0000002f jmp 00007FE5150D142Eh 0x00000031 btc ecx, ecx 0x00000034 jle 00007FE5150D13E7h 0x00000036 jnle 00007FE5150D13E5h 0x00000038 mov dword ptr [esi], eax 0x0000003a lea ecx, dword ptr [ebp+00003F07h] 0x00000040 bts cx, bx 0x00000044 jmp 00007FE5150D1489h 0x00000049 jc 00007FE5150D1388h 0x0000004b xchg dh, cl 0x0000004d mov dx, FA48h 0x00000051 jmp 00007FE5150CF9ACh 0x00000056 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD01BCB second address: 000000006CD01E93 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 11h 0x00000005 mov word ptr [esp+07h], ax 0x0000000a inc dx 0x0000000c jmp 00007FE5151CE62Dh 0x0000000e lea esp, dword ptr [esp+01h] 0x00000012 lea edi, dword ptr [edi-0000002Bh] 0x00000018 bswap edx 0x0000001a adc edx, ecx 0x0000001c dec dh 0x0000001e setb ah 0x00000021 jmp 00007FE5151CEC5Fh 0x00000026 xchg dword ptr [esp+10h], edi 0x0000002a bsr eax, ecx 0x0000002d sub eax, esi 0x0000002f push dword ptr [esp+10h] 0x00000033 retn 0014h 0x00000036 mov edx, eax 0x00000038 mov eax, ebp 0x0000003a btr eax, ebp 0x0000003d jmp 00007FE5151CEA20h 0x00000042 jl 00007FE5151CE7AAh 0x00000048 mov eax, esi 0x0000004a inc cl 0x0000004c bsr dx, ax 0x00000050 jmp 00007FE5151CE269h 0x00000055 jnp 00007FE5151CE6EEh 0x0000005b mov edx, dword ptr [esp] 0x0000005e xchg eax, edx 0x0000005f jmp 00007FE5151CE4F1h 0x00000064 bsf edx, ebp 0x00000067 jmp 00007FE5151CE807h 0x0000006c pushad 0x0000006d rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD0345B second address: 000000006CD034FB instructions: 0x00000000 rdtsc 0x00000002 mov ch, bh 0x00000004 stc 0x00000005 mov eax, dword ptr [esp] 0x00000008 jmp 00007FE5151CE629h 0x0000000a mov dl, E0h 0x0000000c push dword ptr [esp+18h] 0x00000010 retn 001Ch 0x00000013 mov edi, dword ptr [ebp+00h] 0x00000016 lea eax, dword ptr [edx+ebx] 0x00000019 setnle cl 0x0000001c mov eax, B0A52D3Ah 0x00000021 jmp 00007FE5151CE7F9h 0x00000026 push bx 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c add ebp, 04h 0x0000002f mov dx, word ptr [esp] 0x00000033 mov ecx, edx 0x00000035 jmp 00007FE5151CE555h 0x0000003a push esi 0x0000003b neg ah 0x0000003d jnle 00007FE5151CE5B7h 0x0000003f not ch 0x00000041 cmc 0x00000042 jmp 00007FE5151CE592h 0x00000044 push edi 0x00000045 neg ecx 0x00000047 jne 00007FE5151CE5F6h 0x00000049 jmp 00007FE5151CE664h 0x0000004b clc 0x0000004c rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFAD3A second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+ebx*4] 0x00000009 mov ecx, D5B43DB6h 0x0000000e jmp 00007FE5150C3289h 0x00000013 mov ebx, ebp 0x00000015 lea eax, dword ptr [esp+ecx] 0x00000018 setle ah 0x0000001b sets dl 0x0000001e call 00007FE5150D13DFh 0x00000023 xchg cl, ch 0x00000025 pushad 0x00000026 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD0457D second address: 000000006CD0457F instructions: 0x00000000 rdtsc 0x00000002 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCFE1D1 second address: 000000006CCFE3D9 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 xchg word ptr [esp], ax 0x00000007 lea ecx, dword ptr [ecx+esi] 0x0000000a xchg dword ptr [esp+04h], esi 0x0000000e jmp 00007FE5151CE616h 0x00000010 cmc 0x00000011 neg al 0x00000013 dec cx 0x00000015 lea ecx, dword ptr [00000000h+edi*4] 0x0000001c mov eax, 63E4BEA4h 0x00000021 jmp 00007FE5151CE7F0h 0x00000026 lea esi, dword ptr [esi+2Ah] 0x00000029 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD121EC second address: 000000006CD121EE instructions: 0x00000000 rdtsc 0x00000002 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CCEA7C8 second address: 000000006CCEA807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE5ECh 0x00000004 sub esp, 000000A0h 0x0000000a call 00007FE5151CE665h 0x0000000f setno bl 0x00000012 mov al, byte ptr [esp] 0x00000015 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD039C4 second address: 000000006CD039F9 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 jmp 00007FE5150D13D5h 0x00000008 lea ebp, dword ptr [ebp-00000520h] 0x0000000e xchg eax, edx 0x0000000f lea eax, dword ptr [00000000h+ecx*4] 0x00000016 jmp 00007FE5150D143Ch 0x00000018 mov dx, bp 0x0000001b lea eax, dword ptr [edi+ebp] 0x0000001e not eax 0x00000020 xchg dword ptr [esp+3Ch], ebp 0x00000024 bsf dx, di 0x00000028 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3A396 second address: 000000006CD3A359 instructions: 0x00000000 rdtsc 0x00000002 bswap ecx 0x00000004 mov dh, byte ptr [esp] 0x00000007 jmp 00007FE5151CE4E8h 0x0000000c add esi, 02h 0x0000000f btr cx, ax 0x00000013 jno 00007FE5151CE6EDh 0x00000019 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3A359 second address: 000000006CD3A2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1351h 0x00000007 not cl 0x00000009 call 00007FE5150D144Dh 0x0000000e lea edx, dword ptr [00000000h+esi*4] 0x00000015 mov cx, E8B9h 0x00000019 rcl dx, cl 0x0000001c btc cx, ax 0x00000020 xchg al, cl 0x00000022 jmp 00007FE5150D13C9h 0x00000024 xchg dword ptr [esp], edi 0x00000027 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3A2DB second address: 000000006CD3A2D0 instructions: 0x00000000 rdtsc 0x00000002 btc eax, ebx 0x00000005 mov eax, edx 0x00000007 xchg ch, ah 0x00000009 lea edi, dword ptr [edi-0004D459h] 0x0000000f jmp 00007FE5151CE5E8h 0x00000011 mov eax, edi 0x00000013 mov dx, EA8Dh 0x00000017 lea ecx, dword ptr [ebx+52h] 0x0000001a xchg dword ptr [esp], edi 0x0000001d bswap edx 0x0000001f rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3A2D0 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1455h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD2288F second address: 000000006CD2288F instructions: 0x00000000 rdtsc 0x00000002 mov di, word ptr [esp] 0x00000006 mov dword ptr [esp+1Ch], ebp 0x0000000a popad 0x0000000b jmp 00007FE5151CE62Eh 0x0000000d lea eax, dword ptr [eax+74h] 0x00000010 mov ecx, dword ptr [eax] 0x00000012 pop eax 0x00000013 jmp 00007FE5151CE632h 0x00000015 dec dword ptr [ebp+74h] 0x00000018 sub esp, 16h 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f jmp 00007FE5151CE644h 0x00000021 lea esp, dword ptr [esp+14h] 0x00000025 test ecx, ecx 0x00000027 jne 00007FE5151CE56Eh 0x0000002d mov byte ptr [eax], 00000000h 0x00000030 jmp 00007FE5151CE616h 0x00000032 inc eax 0x00000033 jmp 00007FE5151CE5E0h 0x00000035 push eax 0x00000036 jmp 00007FE5151CE641h 0x00000038 pushad 0x00000039 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5150D1451h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5150D13E2h 0x00000014 jne 00007FE5150D1BF3h 0x0000001a neg ch 0x0000001c jmp 00007FE5150D12DFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5150D1381h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5150D0E0Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5150D1335h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5150D13E8h 0x00000052 setno ch 0x00000055 jmp 00007FE5150D1440h 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5150D13D3h 0x0000005e jmp 00007FE5150D13EAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5150D1413h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5150D1406h 0x00000077 jmp 00007FE5150D143Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49ED1 second address: 000000006CD49EEE instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ebx 0x00000005 jmp 00007FE5151CE5C2h 0x00000007 not ah 0x00000009 mov eax, DB0AC25Ah 0x0000000e mov edx, F128A53Ch 0x00000013 pushfd 0x00000014 jmp 00007FE5151CE627h 0x00000016 lea ebx, dword ptr [ebx-00044E40h] 0x0000001c mov dx, word ptr [esp] 0x00000020 mov dh, cl 0x00000022 neg dx 0x00000025 jmp 00007FE5151CE643h 0x00000027 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49EEE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 btc eax, esp 0x00000005 xchg dword ptr [esp+04h], ebx 0x00000009 mov cx, 5D6Fh 0x0000000d xchg cx, ax 0x00000010 sub esp, 1Eh 0x00000013 jmp 00007FE5150D13D7h 0x00000015 mov dl, bl 0x00000017 not cx 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e push dword ptr [esp+20h] 0x00000022 retn 0024h 0x00000025 jmp 00007FE5150D1448h 0x00000027 stc 0x00000028 jnle 00007FE5150D13B9h 0x0000002a bsf cx, di 0x0000002e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD32D5E second address: 000000006CD32CA4 instructions: 0x00000000 rdtsc 0x00000002 mov ax, sp 0x00000005 jmp 00007FE5151CE54Eh 0x0000000a lea eax, dword ptr [edi+edi] 0x0000000d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD32CA4 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE51509FFA3h 0x00000007 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3B6DE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 mov word ptr [edi], cx 0x00000005 bswap eax 0x00000007 setb al 0x0000000a inc cx 0x0000000c jmp 00007FE5151CE641h 0x0000000e jne 00007FE5151CE5E5h 0x00000010 jmp 00007FE515197F65h 0x00000015 jmp 00007FE5151CE658h 0x00000017 stc 0x00000018 jnle 00007FE5151CE5C9h 0x0000001a bsf cx, di 0x0000001e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD034C3 second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1438h 0x00000004 push ebp 0x00000005 call 00007FE5150D13E3h 0x0000000a push esp 0x0000000b mov esi, dword ptr [esp+03h] 0x0000000f bswap eax 0x00000011 mov byte ptr [esp+01h], cl 0x00000015 mov word ptr [esp+01h], sp 0x0000001a jmp 00007FE5150D1429h 0x0000001c xchg dword ptr [esp+04h], ebp 0x00000020 pushad 0x00000021 inc cx 0x00000023 bsf di, bx 0x00000027 pop esi 0x00000028 clc 0x00000029 jmp 00007FE5150D13DDh 0x0000002b lea ebp, dword ptr [ebp-0000003Ch] 0x00000031 mov cl, dl 0x00000033 bsr edi, ecx 0x00000036 cmc 0x00000037 cmc 0x00000038 jmp 00007FE5150D144Dh 0x0000003a xchg dword ptr [esp+20h], ebp 0x0000003e inc cl 0x00000040 cmc 0x00000041 setne dh 0x00000044 lea edi, dword ptr [ecx+ebp] 0x00000047 push dword ptr [esp+20h] 0x0000004b retn 0024h 0x0000004e bswap edx 0x00000050 jmp 00007FE5150D1474h 0x00000052 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3EFCD second address: 000000006CCFEEEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5151CE5F7h 0x00000008 sub esi, 08h 0x0000000b pushfd 0x0000000c jmp 00007FE5151CE657h 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 xchg edx, ecx 0x00000018 call 00007FE5151CE5F0h 0x0000001d add esp, 01h 0x00000020 jnle 00007FE5151CE648h 0x00000022 jmp 00007FE5151CE5FAh 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007FE5151CE624h 0x0000002a mov dword ptr [esi], ecx 0x0000002c mov ecx, edx 0x0000002e mov cx, word ptr [esp] 0x00000032 bsf ecx, ebx 0x00000035 jmp 00007FE5151CE65Fh 0x00000037 jnle 00007FE5151CE5C7h 0x00000039 mov cx, 166Ah 0x0000003d jmp 00007FE5151CE631h 0x0000003f mov dword ptr [esi+04h], eax 0x00000042 push dx 0x00000044 add esp, 01h 0x00000047 jmp 00007FE5151CE64Ah 0x00000049 jnle 00007FE5151CE5DCh 0x0000004b xchg byte ptr [esp], ah 0x0000004e lea esp, dword ptr [esp+01h] 0x00000052 jmp 00007FE51518E483h 0x00000057 mov cl, byte ptr [esp] 0x0000005a rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD34C1C second address: 000000006CD34C48 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 02h 0x00000005 neg cx 0x00000008 js 00007FE5150D141Ch 0x0000000a add edx, 213E919Dh 0x00000010 mov edx, eax 0x00000012 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5151CE647h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5151CE7CAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5151CE512h 0x00000027 jnl 00007FE5151CE50Ch 0x0000002d call 00007FE5151CE5F1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5151CE5F6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5151CE629h 0x0000003d jp 00007FE5151CE627h 0x0000003f mov dword ptr [esi], ecx 0x00000041 jmp 00007FE5151CE663h 0x00000043 mov ch, 19h 0x00000045 mov cx, 60D1h 0x00000049 lea ecx, dword ptr [00000000h+ebx*4] 0x00000050 bsr ecx, edi 0x00000053 jle 00007FE5151CE5DFh 0x00000055 jnle 00007FE5151CE5DDh 0x00000057 jmp 00007FE5151CE5FAh 0x00000059 mov ecx, esi 0x0000005b jmp 00007FE5151CE626h 0x0000005d add ecx, 04h 0x00000060 jmp 00007FE5151CE65Fh 0x00000062 jne 00007FE5151CE5C7h 0x00000064 mov dword ptr [ecx], eax 0x00000066 bswap eax 0x00000068 mov ecx, esi 0x0000006a jmp 00007FE515180296h 0x0000006f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD2288F second address: 000000006CD2288F instructions: 0x00000000 rdtsc 0x00000002 mov di, word ptr [esp] 0x00000006 mov dword ptr [esp+1Ch], ebp 0x0000000a popad 0x0000000b jmp 00007FE5150D141Eh 0x0000000d lea eax, dword ptr [eax+74h] 0x00000010 mov ecx, dword ptr [eax] 0x00000012 pop eax 0x00000013 jmp 00007FE5150D1422h 0x00000015 dec dword ptr [ebp+74h] 0x00000018 sub esp, 16h 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f jmp 00007FE5150D1434h 0x00000021 lea esp, dword ptr [esp+14h] 0x00000025 test ecx, ecx 0x00000027 jne 00007FE5150D135Eh 0x0000002d mov byte ptr [eax], 00000000h 0x00000030 jmp 00007FE5150D1406h 0x00000032 inc eax 0x00000033 jmp 00007FE5150D13D0h 0x00000035 push eax 0x00000036 jmp 00007FE5150D1431h 0x00000038 pushad 0x00000039 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5151CE661h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5151CE5F2h 0x00000014 jne 00007FE5151CEE03h 0x0000001a neg ch 0x0000001c jmp 00007FE5151CE4EFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5151CE591h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5151CE01Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5151CE545h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5151CE5F8h 0x00000052 setno ch 0x00000055 jmp 00007FE5151CE66Ah 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5151CE5E3h 0x0000005e jmp 00007FE5151CE5FAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5151CE623h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5151CE616h 0x00000077 jmp 00007FE5151CE64Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49ED1 second address: 000000006CD49EEE instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ebx 0x00000005 jmp 00007FE5150D13B2h 0x00000007 not ah 0x00000009 mov eax, DB0AC25Ah 0x0000000e mov edx, F128A53Ch 0x00000013 pushfd 0x00000014 jmp 00007FE5150D1417h 0x00000016 lea ebx, dword ptr [ebx-00044E40h] 0x0000001c mov dx, word ptr [esp] 0x00000020 mov dh, cl 0x00000022 neg dx 0x00000025 jmp 00007FE5150D1433h 0x00000027 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49EEE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 btc eax, esp 0x00000005 xchg dword ptr [esp+04h], ebx 0x00000009 mov cx, 5D6Fh 0x0000000d xchg cx, ax 0x00000010 sub esp, 1Eh 0x00000013 jmp 00007FE5151CE5E7h 0x00000015 mov dl, bl 0x00000017 not cx 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e push dword ptr [esp+20h] 0x00000022 retn 0024h 0x00000025 jmp 00007FE5151CE658h 0x00000027 stc 0x00000028 jnle 00007FE5151CE5C9h 0x0000002a bsf cx, di 0x0000002e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD32D5E second address: 000000006CD32CA4 instructions: 0x00000000 rdtsc 0x00000002 mov ax, sp 0x00000005 jmp 00007FE5150D133Eh 0x0000000a lea eax, dword ptr [edi+edi] 0x0000000d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD32CA4 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE51519D1B3h 0x00000007 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3B6DE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 mov word ptr [edi], cx 0x00000005 bswap eax 0x00000007 setb al 0x0000000a inc cx 0x0000000c jmp 00007FE5150D1431h 0x0000000e jne 00007FE5150D13D5h 0x00000010 jmp 00007FE51509AD55h 0x00000015 jmp 00007FE5150D1448h 0x00000017 stc 0x00000018 jnle 00007FE5150D13B9h 0x0000001a bsf cx, di 0x0000001e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD034C3 second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE648h 0x00000004 push ebp 0x00000005 call 00007FE5151CE5F3h 0x0000000a push esp 0x0000000b mov esi, dword ptr [esp+03h] 0x0000000f bswap eax 0x00000011 mov byte ptr [esp+01h], cl 0x00000015 mov word ptr [esp+01h], sp 0x0000001a jmp 00007FE5151CE639h 0x0000001c xchg dword ptr [esp+04h], ebp 0x00000020 pushad 0x00000021 inc cx 0x00000023 bsf di, bx 0x00000027 pop esi 0x00000028 clc 0x00000029 jmp 00007FE5151CE5EDh 0x0000002b lea ebp, dword ptr [ebp-0000003Ch] 0x00000031 mov cl, dl 0x00000033 bsr edi, ecx 0x00000036 cmc 0x00000037 cmc 0x00000038 jmp 00007FE5151CE65Dh 0x0000003a xchg dword ptr [esp+20h], ebp 0x0000003e inc cl 0x00000040 cmc 0x00000041 setne dh 0x00000044 lea edi, dword ptr [ecx+ebp] 0x00000047 push dword ptr [esp+20h] 0x0000004b retn 0024h 0x0000004e bswap edx 0x00000050 jmp 00007FE5151CE684h 0x00000052 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3EFCD second address: 000000006CCFEEEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5150D13E7h 0x00000008 sub esi, 08h 0x0000000b pushfd 0x0000000c jmp 00007FE5150D1447h 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 xchg edx, ecx 0x00000018 call 00007FE5150D13E0h 0x0000001d add esp, 01h 0x00000020 jnle 00007FE5150D1438h 0x00000022 jmp 00007FE5150D13EAh 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007FE5150D1414h 0x0000002a mov dword ptr [esi], ecx 0x0000002c mov ecx, edx 0x0000002e mov cx, word ptr [esp] 0x00000032 bsf ecx, ebx 0x00000035 jmp 00007FE5150D144Fh 0x00000037 jnle 00007FE5150D13B7h 0x00000039 mov cx, 166Ah 0x0000003d jmp 00007FE5150D1421h 0x0000003f mov dword ptr [esi+04h], eax 0x00000042 push dx 0x00000044 add esp, 01h 0x00000047 jmp 00007FE5150D143Ah 0x00000049 jnle 00007FE5150D13CCh 0x0000004b xchg byte ptr [esp], ah 0x0000004e lea esp, dword ptr [esp+01h] 0x00000052 jmp 00007FE515091273h 0x00000057 mov cl, byte ptr [esp] 0x0000005a rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD34C1C second address: 000000006CD34C48 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 02h 0x00000005 neg cx 0x00000008 js 00007FE5151CE62Ch 0x0000000a add edx, 213E919Dh 0x00000010 mov edx, eax 0x00000012 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5150D1437h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5150D15BAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5150D1302h 0x00000027 jnl 00007FE5150D12FCh 0x0000002d call 00007FE5150D13E1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5150D13E6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5150D1419h 0x0000003d mov dword ptr [esi], ecx 0x0000003f jmp 00007FE5150D1453h 0x00000041 mov ch, 19h 0x00000043 mov cx, 60D1h 0x00000047 lea ecx, dword ptr [00000000h+ebx*4] 0x0000004e bsr ecx, edi 0x00000051 jle 00007FE5150D13CFh 0x00000053 jnle 00007FE5150D13CDh 0x00000055 jmp 00007FE5150D13EAh 0x00000057 mov ecx, esi 0x00000059 jmp 00007FE5150D1416h 0x0000005b add ecx, 04h 0x0000005e jmp 00007FE5150D144Fh 0x00000060 jne 00007FE5150D13B7h 0x00000062 mov dword ptr [ecx], eax 0x00000064 bswap eax 0x00000066 mov ecx, esi 0x00000068 jmp 00007FE515083086h 0x0000006d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD12145 second address: 000000006CD12238 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FE5151CE645h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov al, 6Ah 0x0000000b ror ax, cl 0x0000000e setb dh 0x00000011 bsf eax, eax 0x00000014 lea edx, dword ptr [ecx-1DD4EFFBh] 0x0000001a jmp 00007FE5151CE5E6h 0x0000001c lea ecx, dword ptr [ecx-00000024h] 0x00000022 not edx 0x00000024 push edi 0x00000025 mov dx, word ptr [esp+03h] 0x0000002a jmp 00007FE5151CE662h 0x0000002c xchg dword ptr [esp+04h], ecx 0x00000030 bswap edx 0x00000032 lea eax, dword ptr [00000000h+ecx*4] 0x00000039 mov ah, EDh 0x0000003b push dword ptr [esp+04h] 0x0000003f retn 0008h 0x00000042 stc 0x00000043 jbe 00007FE5151CE69Ch 0x00000049 call 00007FE5151CE833h 0x0000004e xchg edx, eax 0x00000050 mov eax, edi 0x00000052 mov dx, bp 0x00000055 push edi 0x00000056 xchg dword ptr [esp+04h], ecx 0x0000005a jmp 00007FE5151CE47Dh 0x0000005f mov ah, 99h 0x00000061 sub esp, 01h 0x00000064 neg dx 0x00000067 mov byte ptr [esp], dh 0x0000006a cmc 0x0000006b lea esp, dword ptr [esp+01h] 0x0000006f jmp 00007FE5151CE5E2h 0x00000071 lea ecx, dword ptr [ecx+34h] 0x00000074 call 00007FE5151CE5F7h 0x00000079 mov word ptr [esp], ax 0x0000007d lea edx, dword ptr [edi+2Dh] 0x00000080 lea eax, dword ptr [00000000h+edx*4] 0x00000087 jmp 00007FE5151CE620h 0x00000089 xchg dword ptr [esp+08h], ecx 0x0000008d mov al, bl 0x0000008f sub esp, 0Ah 0x00000092 mov dword ptr [esp+04h], esi 0x00000096 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD12145 second address: 000000006CD12238 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FE5150D1435h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov al, 6Ah 0x0000000b ror ax, cl 0x0000000e setb dh 0x00000011 bsf eax, eax 0x00000014 lea edx, dword ptr [ecx-1DD4EFFBh] 0x0000001a jmp 00007FE5150D13D6h 0x0000001c lea ecx, dword ptr [ecx-00000024h] 0x00000022 not edx 0x00000024 push edi 0x00000025 mov dx, word ptr [esp+03h] 0x0000002a jmp 00007FE5150D1452h 0x0000002c xchg dword ptr [esp+04h], ecx 0x00000030 bswap edx 0x00000032 lea eax, dword ptr [00000000h+ecx*4] 0x00000039 mov ah, EDh 0x0000003b push dword ptr [esp+04h] 0x0000003f retn 0008h 0x00000042 stc 0x00000043 jbe 00007FE5150D148Ch 0x00000049 call 00007FE5150D1623h 0x0000004e xchg edx, eax 0x00000050 mov eax, edi 0x00000052 mov dx, bp 0x00000055 push edi 0x00000056 xchg dword ptr [esp+04h], ecx 0x0000005a jmp 00007FE5150D126Dh 0x0000005f mov ah, 99h 0x00000061 sub esp, 01h 0x00000064 neg dx 0x00000067 mov byte ptr [esp], dh 0x0000006a cmc 0x0000006b lea esp, dword ptr [esp+01h] 0x0000006f jmp 00007FE5150D13D2h 0x00000071 lea ecx, dword ptr [ecx+34h] 0x00000074 call 00007FE5150D13E7h 0x00000079 mov word ptr [esp], ax 0x0000007d lea edx, dword ptr [edi+2Dh] 0x00000080 lea eax, dword ptr [00000000h+edx*4] 0x00000087 jmp 00007FE5150D1410h 0x00000089 xchg dword ptr [esp+08h], ecx 0x0000008d mov al, bl 0x0000008f sub esp, 0Ah 0x00000092 mov dword ptr [esp+04h], esi 0x00000096 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD39B34 second address: 000000006CD39BA7 instructions: 0x00000000 rdtsc 0x00000002 ror eax, 0Bh 0x00000005 je 00007FE5151CE5D0h 0x00000007 bswap eax 0x00000009 mov ah, byte ptr [esp] 0x0000000c mov dx, bp 0x0000000f call 00007FE5151CE616h 0x00000014 mov edx, ebp 0x00000016 mov dh, ch 0x00000018 lea eax, dword ptr [ebp+ebp+00h] 0x0000001c sub esp, 19h 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 jmp 00007FE5151CE655h 0x00000025 xchg dword ptr [esp+18h], esi 0x00000029 xchg edx, eax 0x0000002b mov dx, C92Fh 0x0000002f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4CF3F second address: 000000006CD4CEDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1FA9h 0x00000007 mov dx, word ptr [esp] 0x0000000b push dword ptr [esp+04h] 0x0000000f retn 0008h 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 mov ecx, dword ptr [ebp+00h] 0x00000019 mov dx, 4C2Eh 0x0000001d jmp 00007FE5150D1407h 0x0000001f mov dh, byte ptr [esp] 0x00000022 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5150D1451h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5150D13E2h 0x00000014 jne 00007FE5150D1BF3h 0x0000001a neg ch 0x0000001c jmp 00007FE5150D12DFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5150D1381h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5150D0E0Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5150D1335h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5150D13E8h 0x00000052 setno ch 0x00000055 jmp 00007FE5150D145Ah 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5150D13D3h 0x0000005e jmp 00007FE5150D13EAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5150D1413h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5150D1406h 0x00000077 jmp 00007FE5150D143Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5151CE647h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5151CE7CAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5151CE512h 0x00000027 jnl 00007FE5151CE50Ch 0x0000002d call 00007FE5151CE5F1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5151CE5F6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5151CE629h 0x0000003d mov dword ptr [esi], ecx 0x0000003f jmp 00007FE5151CE663h 0x00000041 mov ch, 19h 0x00000043 mov cx, 60D1h 0x00000047 lea ecx, dword ptr [00000000h+ebx*4] 0x0000004e bsr ecx, edi 0x00000051 jle 00007FE5151CE5DFh 0x00000053 jnle 00007FE5151CE5DDh 0x00000055 jmp 00007FE5151CE5FAh 0x00000057 mov ecx, esi 0x00000059 jmp 00007FE5151CE626h 0x0000005b add ecx, 04h 0x0000005e jmp 00007FE5151CE65Fh 0x00000060 jne 00007FE5151CE5C7h 0x00000062 mov dword ptr [ecx], eax 0x00000064 bswap eax 0x00000066 mov ecx, esi 0x00000068 jmp 00007FE515180296h 0x0000006d rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD39B34 second address: 000000006CD39BA7 instructions: 0x00000000 rdtsc 0x00000002 ror eax, 0Bh 0x00000005 je 00007FE5150D13C0h 0x00000007 bswap eax 0x00000009 mov ah, byte ptr [esp] 0x0000000c mov dx, bp 0x0000000f call 00007FE5150D1406h 0x00000014 mov edx, ebp 0x00000016 mov dh, ch 0x00000018 lea eax, dword ptr [ebp+ebp+00h] 0x0000001c sub esp, 19h 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 jmp 00007FE5150D1445h 0x00000025 xchg dword ptr [esp+18h], esi 0x00000029 xchg edx, eax 0x0000002b mov dx, C92Fh 0x0000002f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4CF3F second address: 000000006CD4CEDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CF1B9h 0x00000007 mov dx, word ptr [esp] 0x0000000b push dword ptr [esp+04h] 0x0000000f retn 0008h 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 mov ecx, dword ptr [ebp+00h] 0x00000019 mov dx, 4C2Eh 0x0000001d jmp 00007FE5151CE617h 0x0000001f mov dh, byte ptr [esp] 0x00000022 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD2288F second address: 000000006CD2288F instructions: 0x00000000 rdtsc 0x00000002 mov di, word ptr [esp] 0x00000006 mov dword ptr [esp+1Ch], ebp 0x0000000a popad 0x0000000b jmp 00007FE5150D141Eh 0x0000000d lea eax, dword ptr [eax+74h] 0x00000010 mov ecx, dword ptr [eax] 0x00000012 pop eax 0x00000013 jmp 00007FE5150D1422h 0x00000015 dec dword ptr [ebp+74h] 0x00000018 sub esp, 16h 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f jmp 00007FE5150D1434h 0x00000021 lea esp, dword ptr [esp+14h] 0x00000025 test ecx, ecx 0x00000027 jne 00007FE5150D135Eh 0x0000002d mov byte ptr [eax], 00000000h 0x00000030 jmp 00007FE5150D1406h 0x00000032 inc eax 0x00000033 jmp 00007FE5150D13D0h 0x00000035 push eax 0x00000036 jmp 00007FE5150D1431h 0x00000038 pushad 0x00000039 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5151CE661h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5151CE5F2h 0x00000014 jne 00007FE5151CEE03h 0x0000001a neg ch 0x0000001c jmp 00007FE5151CE4EFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5151CE591h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5151CE01Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5151CE545h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5151CE5F8h 0x00000052 setno ch 0x00000055 jmp 00007FE5151CE66Ah 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5151CE5E3h 0x0000005e jmp 00007FE5151CE5FAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5151CE623h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5151CE616h 0x00000077 jmp 00007FE5151CE64Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD49ED1 second address: 000000006CD49EEE instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ebx 0x00000005 jmp 00007FE5150D13B2h 0x00000007 not ah 0x00000009 mov eax, DB0AC25Ah 0x0000000e mov edx, F128A53Ch 0x00000013 pushfd 0x00000014 jmp 00007FE5150D1417h 0x00000016 lea ebx, dword ptr [ebx-00044E40h] 0x0000001c mov dx, word ptr [esp] 0x00000020 mov dh, cl 0x00000022 neg dx 0x00000025 jmp 00007FE5150D1433h 0x00000027 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD49EEE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 btc eax, esp 0x00000005 xchg dword ptr [esp+04h], ebx 0x00000009 mov cx, 5D6Fh 0x0000000d xchg cx, ax 0x00000010 sub esp, 1Eh 0x00000013 jmp 00007FE5151CE5E7h 0x00000015 mov dl, bl 0x00000017 not cx 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e push dword ptr [esp+20h] 0x00000022 retn 0024h 0x00000025 jmp 00007FE5151CE658h 0x00000027 stc 0x00000028 jnle 00007FE5151CE5C9h 0x0000002a bsf cx, di 0x0000002e rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD32D5E second address: 000000006CD32CA4 instructions: 0x00000000 rdtsc 0x00000002 mov ax, sp 0x00000005 jmp 00007FE5151CE54Eh 0x0000000a lea eax, dword ptr [edi+edi] 0x0000000d rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD32CA4 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE51509FFA3h 0x00000007 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3B6DE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 mov word ptr [edi], cx 0x00000005 bswap eax 0x00000007 setb al 0x0000000a inc cx 0x0000000c jmp 00007FE5151CE641h 0x0000000e jne 00007FE5151CE5E5h 0x00000010 jmp 00007FE515197F65h 0x00000015 jmp 00007FE5151CE658h 0x00000017 stc 0x00000018 jnle 00007FE5151CE5C9h 0x0000001a bsf cx, di 0x0000001e rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD034C3 second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1438h 0x00000004 push ebp 0x00000005 call 00007FE5150D13E3h 0x0000000a push esp 0x0000000b mov esi, dword ptr [esp+03h] 0x0000000f bswap eax 0x00000011 mov byte ptr [esp+01h], cl 0x00000015 mov word ptr [esp+01h], sp 0x0000001a jmp 00007FE5150D1429h 0x0000001c xchg dword ptr [esp+04h], ebp 0x00000020 pushad 0x00000021 inc cx 0x00000023 bsf di, bx 0x00000027 pop esi 0x00000028 clc 0x00000029 jmp 00007FE5150D13DDh 0x0000002b lea ebp, dword ptr [ebp-0000003Ch] 0x00000031 mov cl, dl 0x00000033 bsr edi, ecx 0x00000036 cmc 0x00000037 cmc 0x00000038 jmp 00007FE5150D144Dh 0x0000003a xchg dword ptr [esp+20h], ebp 0x0000003e inc cl 0x00000040 cmc 0x00000041 setne dh 0x00000044 lea edi, dword ptr [ecx+ebp] 0x00000047 push dword ptr [esp+20h] 0x0000004b retn 0024h 0x0000004e bswap edx 0x00000050 jmp 00007FE5150D1474h 0x00000052 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3EFCD second address: 000000006CCFEEEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5151CE5F7h 0x00000008 sub esi, 08h 0x0000000b pushfd 0x0000000c jmp 00007FE5151CE657h 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 xchg edx, ecx 0x00000018 call 00007FE5151CE5F0h 0x0000001d add esp, 01h 0x00000020 jnle 00007FE5151CE648h 0x00000022 jmp 00007FE5151CE5FAh 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007FE5151CE624h 0x0000002a mov dword ptr [esi], ecx 0x0000002c mov ecx, edx 0x0000002e mov cx, word ptr [esp] 0x00000032 bsf ecx, ebx 0x00000035 jmp 00007FE5151CE65Fh 0x00000037 jnle 00007FE5151CE5C7h 0x00000039 mov cx, 166Ah 0x0000003d jmp 00007FE5151CE631h 0x0000003f mov dword ptr [esi+04h], eax 0x00000042 push dx 0x00000044 add esp, 01h 0x00000047 jmp 00007FE5151CE64Ah 0x00000049 jnle 00007FE5151CE5DCh 0x0000004b xchg byte ptr [esp], ah 0x0000004e lea esp, dword ptr [esp+01h] 0x00000052 jmp 00007FE51518E483h 0x00000057 mov cl, byte ptr [esp] 0x0000005a rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD34C1C second address: 000000006CD34C48 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 02h 0x00000005 neg cx 0x00000008 js 00007FE5150D141Ch 0x0000000a add edx, 213E919Dh 0x00000010 mov edx, eax 0x00000012 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5151CE647h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5151CE7CAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5151CE512h 0x00000027 jnl 00007FE5151CE50Ch 0x0000002d call 00007FE5151CE5F1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5151CE5F6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5151CE629h 0x0000003d jp 00007FE5151CE627h 0x0000003f mov dword ptr [esi], ecx 0x00000041 jmp 00007FE5151CE663h 0x00000043 mov ch, 19h 0x00000045 mov cx, 60D1h 0x00000049 lea ecx, dword ptr [00000000h+ebx*4] 0x00000050 bsr ecx, edi 0x00000053 jle 00007FE5151CE5DFh 0x00000055 jnle 00007FE5151CE5DDh 0x00000057 jmp 00007FE5151CE5FAh 0x00000059 mov ecx, esi 0x0000005b jmp 00007FE5151CE626h 0x0000005d add ecx, 04h 0x00000060 jmp 00007FE5151CE65Fh 0x00000062 jne 00007FE5151CE5C7h 0x00000064 mov dword ptr [ecx], eax 0x00000066 bswap eax 0x00000068 mov ecx, esi 0x0000006a jmp 00007FE515180296h 0x0000006f rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD12145 second address: 000000006CD12238 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FE5150D1435h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov al, 6Ah 0x0000000b ror ax, cl 0x0000000e setb dh 0x00000011 bsf eax, eax 0x00000014 lea edx, dword ptr [ecx-1DD4EFFBh] 0x0000001a jmp 00007FE5150D13D6h 0x0000001c lea ecx, dword ptr [ecx-00000024h] 0x00000022 not edx 0x00000024 push edi 0x00000025 mov dx, word ptr [esp+03h] 0x0000002a jmp 00007FE5150D1452h 0x0000002c xchg dword ptr [esp+04h], ecx 0x00000030 bswap edx 0x00000032 lea eax, dword ptr [00000000h+ecx*4] 0x00000039 mov ah, EDh 0x0000003b push dword ptr [esp+04h] 0x0000003f retn 0008h 0x00000042 stc 0x00000043 jbe 00007FE5150D148Ch 0x00000049 call 00007FE5150D1623h 0x0000004e xchg edx, eax 0x00000050 mov eax, edi 0x00000052 mov dx, bp 0x00000055 push edi 0x00000056 xchg dword ptr [esp+04h], ecx 0x0000005a jmp 00007FE5150D126Dh 0x0000005f mov ah, 99h 0x00000061 sub esp, 01h 0x00000064 neg dx 0x00000067 mov byte ptr [esp], dh 0x0000006a cmc 0x0000006b lea esp, dword ptr [esp+01h] 0x0000006f jmp 00007FE5150D13D2h 0x00000071 lea ecx, dword ptr [ecx+34h] 0x00000074 call 00007FE5150D13E7h 0x00000079 mov word ptr [esp], ax 0x0000007d lea edx, dword ptr [edi+2Dh] 0x00000080 lea eax, dword ptr [00000000h+edx*4] 0x00000087 jmp 00007FE5150D1410h 0x00000089 xchg dword ptr [esp+08h], ecx 0x0000008d mov al, bl 0x0000008f sub esp, 0Ah 0x00000092 mov dword ptr [esp+04h], esi 0x00000096 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4AF6D second address: 000000006CD4AF32 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jmp 00007FE5151CE5AFh 0x00000006 jc 00007FE5151CE62Fh 0x00000008 mov eax, dword ptr [esp] 0x0000000b rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4AF6D second address: 000000006CD4AF32 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jmp 00007FE5150D139Fh 0x00000006 jc 00007FE5150D141Fh 0x00000008 mov eax, dword ptr [esp] 0x0000000b rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD39B34 second address: 000000006CD39BA7 instructions: 0x00000000 rdtsc 0x00000002 ror eax, 0Bh 0x00000005 je 00007FE5151CE5D0h 0x00000007 bswap eax 0x00000009 mov ah, byte ptr [esp] 0x0000000c mov dx, bp 0x0000000f call 00007FE5151CE616h 0x00000014 mov edx, ebp 0x00000016 mov dh, ch 0x00000018 lea eax, dword ptr [ebp+ebp+00h] 0x0000001c sub esp, 19h 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 jmp 00007FE5151CE655h 0x00000025 xchg dword ptr [esp+18h], esi 0x00000029 xchg edx, eax 0x0000002b mov dx, C92Fh 0x0000002f rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD4CF3F second address: 000000006CD4CEDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1FA9h 0x00000007 mov dx, word ptr [esp] 0x0000000b push dword ptr [esp+04h] 0x0000000f retn 0008h 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 mov ecx, dword ptr [ebp+00h] 0x00000019 mov dx, 4C2Eh 0x0000001d jmp 00007FE5150D1407h 0x0000001f mov dh, byte ptr [esp] 0x00000022 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD05094 instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5150D1406h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5150D1406h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5150D24B5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5150D258Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5150D1303h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5150D142Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5150D13E0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5150D1438h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5150D13DAh 0x00000057 jnp 00007FE5150D13DFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515086A16h 0x0000005f jmp 00007FE5150D1448h 0x00000061 stc 0x00000062 jnle 00007FE5150D13B9h 0x00000064 bsf cx, di 0x00000068 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 jnp 00007FE5151CE5EFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515183C26h 0x0000005f jmp 00007FE5151CE658h 0x00000061 stc 0x00000062 jnle 00007FE5151CE5C9h 0x00000064 bsf cx, di 0x00000068 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD4AF6D second address: 000000006CD4AF32 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jmp 00007FE5151CE5AFh 0x00000006 jc 00007FE5151CE62Fh 0x00000008 mov eax, dword ptr [esp] 0x0000000b rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5150D1406h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5150D1406h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5150D24B5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5150D258Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5150D1303h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5150D142Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5150D13E0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5150D1438h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5150D13DAh 0x00000057 dec ecx 0x00000058 jmp 00007FE515086A1Dh 0x0000005d jmp 00007FE5150D1448h 0x0000005f stc 0x00000060 jnle 00007FE5150D13B9h 0x00000062 bsf cx, di 0x00000066 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5151CE71Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5151CE6C9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5151CE59Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5151CE5F4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5151CE641h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5151CE5EDh 0x0000003d jp 00007FE5151CE630h 0x0000003f mov cx, word ptr [esp+03h] 0x00000044 lea ecx, dword ptr [edx-000000F7h] 0x0000004a jmp 00007FE5151CE5E7h 0x0000004c mov dword ptr [ebp+04h], eax 0x0000004f mov ax, sp 0x00000052 mov ecx, dword ptr [esp] 0x00000055 jmp 00007FE5151C53DAh 0x0000005a jmp 00007FE5151CE6FEh 0x0000005f xchg eax, ecx 0x00000060 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5150D150Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5150D14B9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5150D138Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5150D13E4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5150D1431h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5150D13DDh 0x0000003d jp 00007FE5150D1420h 0x0000003f mov cx, word ptr [esp+03h] 0x00000044 lea ecx, dword ptr [edx-000000F7h] 0x0000004a jmp 00007FE5150D13D7h 0x0000004c mov dword ptr [ebp+04h], eax 0x0000004f mov ax, sp 0x00000052 mov ecx, dword ptr [esp] 0x00000055 jmp 00007FE5150C81CAh 0x0000005a jmp 00007FE5150D14EEh 0x0000005f xchg eax, ecx 0x00000060 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 dec ecx 0x00000058 jmp 00007FE515183C2Dh 0x0000005d jmp 00007FE5151CE658h 0x0000005f stc 0x00000060 jnle 00007FE5151CE5C9h 0x00000062 bsf cx, di 0x00000066 rdtsc
            Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5151CE71Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5151CE6C9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5151CE59Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5151CE5F4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5151CE641h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5151CE5EDh 0x0000003d jp 00007FE5151CE630h 0x0000003f mov cx, word ptr [esp+03h] 0x00000044 lea ecx, dword ptr [edx-000000F7h] 0x0000004a jmp 00007FE5151CE5E7h 0x0000004c mov dword ptr [ebp+04h], eax 0x0000004f mov ax, sp 0x00000052 mov ecx, dword ptr [esp] 0x00000055 jmp 00007FE5151C53DAh 0x0000005a jmp 00007FE5151CE6FEh 0x0000005f xchg eax, ecx 0x00000060 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5150D13DFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5150D142Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5150D13E4h 0x0000001c jmp 00007FE5150D1494h 0x00000021 pop ebp 0x00000022 mov ch, 2Fh 0x00000024 mov ax, BE00h 0x00000028 or eax, ebx 0x0000002a jnle 00007FE5150D13C1h 0x0000002c jle 00007FE5150D13A9h 0x0000002e add esp, 04h 0x00000031 jnbe 00007FE5150D142Bh 0x00000033 pushfd 0x00000034 mov cx, word ptr [esp+02h] 0x00000039 jmp 00007FE5150D13E4h 0x0000003b lea edi, dword ptr [ecx+ebx] 0x0000003e mov edi, dword ptr [esp+04h] 0x00000042 mov edx, 6C4C3A78h 0x00000047 push dx 0x00000049 jmp 00007FE5150D1410h 0x0000004b lea esp, dword ptr [esp+02h] 0x0000004f lea esp, dword ptr [esp+08h] 0x00000053 call 00007FE5150D1431h 0x00000058 mov ax, dx 0x0000005b mov cl, B9h 0x0000005d bt dx, bx 0x00000061 xchg dword ptr [esp], ecx 0x00000064 jmp 00007FE5150D13DEh 0x00000066 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5151CE633h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5151CE5E3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5151CE6F0h 0x00000049 jl 00007FE5151CE6CCh 0x0000004f pushfd 0x00000050 mov dx, cx 0x00000053 mov dh, 56h 0x00000055 jmp 00007FE5151CE681h 0x00000057 lea eax, dword ptr [ebx-03h] 0x0000005a lea ecx, dword ptr [ecx-0F5291AAh] 0x00000060 jmp 00007FE5151CE5BDh 0x00000062 lea esp, dword ptr [esp+04h] 0x00000066 sub ebp, 1284C013h 0x0000006c call 00007FE5151CE62Ch 0x00000071 mov ecx, dword ptr [esp] 0x00000074 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5150D1423h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5150D13D3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5150D14E0h 0x00000049 pushfd 0x0000004a mov dx, cx 0x0000004d mov dh, 56h 0x0000004f lea eax, dword ptr [ebx-03h] 0x00000052 lea ecx, dword ptr [ecx-0F5291AAh] 0x00000058 lea esp, dword ptr [esp+04h] 0x0000005c sub ebp, 1284C013h 0x00000062 call 00007FE5150D141Ch 0x00000067 mov ecx, dword ptr [esp] 0x0000006a rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A396 second address: 000000006CD3A359 instructions: 0x00000000 rdtsc 0x00000002 bswap ecx 0x00000004 mov dh, byte ptr [esp] 0x00000007 jmp 00007FE5150D12D8h 0x0000000c add esi, 02h 0x0000000f btr cx, ax 0x00000013 jno 00007FE5150D14DDh 0x00000019 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A359 second address: 000000006CD3A2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE561h 0x00000007 not cl 0x00000009 call 00007FE5151CE65Dh 0x0000000e lea edx, dword ptr [00000000h+esi*4] 0x00000015 mov cx, E8B9h 0x00000019 rcl dx, cl 0x0000001c btc cx, ax 0x00000020 xchg al, cl 0x00000022 jmp 00007FE5151CE5D9h 0x00000024 xchg dword ptr [esp], edi 0x00000027 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A2DB second address: 000000006CD3A2D0 instructions: 0x00000000 rdtsc 0x00000002 btc eax, ebx 0x00000005 mov eax, edx 0x00000007 xchg ch, ah 0x00000009 lea edi, dword ptr [edi-0004D459h] 0x0000000f jmp 00007FE5150D13D8h 0x00000011 mov eax, edi 0x00000013 mov dx, EA8Dh 0x00000017 lea ecx, dword ptr [ebx+52h] 0x0000001a xchg dword ptr [esp], edi 0x0000001d bswap edx 0x0000001f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3A2D0 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE665h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5151CE5EFh 0x00000010 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5151CE661h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5151CE5F2h 0x00000014 jne 00007FE5151CEE03h 0x0000001a neg ch 0x0000001c jmp 00007FE5151CE4EFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5151CE591h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5151CE01Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5151CE545h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5151CE5F8h 0x00000052 setno ch 0x00000055 jmp 00007FE5151CE650h 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5151CE5E3h 0x0000005e jmp 00007FE5151CE5FAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5151CE623h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5151CE616h 0x00000077 jmp 00007FE5151CE64Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5150D1437h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5150D15BAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5150D1302h 0x00000027 jnl 00007FE5150D12FCh 0x0000002d call 00007FE5150D13E1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5150D13E6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5150D1419h 0x0000003d jp 00007FE5150D1417h 0x0000003f mov dword ptr [esi], ecx 0x00000041 jmp 00007FE5150D1453h 0x00000043 mov ch, 19h 0x00000045 mov cx, 60D1h 0x00000049 lea ecx, dword ptr [00000000h+ebx*4] 0x00000050 bsr ecx, edi 0x00000053 jle 00007FE5150D13CFh 0x00000055 jnle 00007FE5150D13CDh 0x00000057 jmp 00007FE5150D13EAh 0x00000059 mov ecx, esi 0x0000005b jmp 00007FE5150D1416h 0x0000005d add ecx, 04h 0x00000060 jmp 00007FE5150D144Fh 0x00000062 jne 00007FE5150D13B7h 0x00000064 mov dword ptr [ecx], eax 0x00000066 bswap eax 0x00000068 mov ecx, esi 0x0000006a jmp 00007FE515083086h 0x0000006f rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 dec ecx 0x00000058 jmp 00007FE515183C2Dh 0x0000005d jmp 00007FE5151CE658h 0x0000005f stc 0x00000060 jnle 00007FE5151CE5C9h 0x00000062 bsf cx, di 0x00000066 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD05094 instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 jnp 00007FE5151CE5EFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515183C26h 0x0000005f jmp 00007FE5151CE658h 0x00000061 stc 0x00000062 jnle 00007FE5151CE5C9h 0x00000064 bsf cx, di 0x00000068 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5150D1406h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5150D1406h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5150D24B5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5150D258Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5150D1303h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5150D142Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5150D13E0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5150D1438h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5150D13DAh 0x00000057 jnp 00007FE5150D13DFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515086A16h 0x0000005f jmp 00007FE5150D1448h 0x00000061 stc 0x00000062 jnle 00007FE5150D13B9h 0x00000064 bsf cx, di 0x00000068 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5151CE71Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5151CE6C9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5151CE59Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5151CE5F4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5151CE641h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5151CE5EDh 0x0000003d mov cx, word ptr [esp+03h] 0x00000042 lea ecx, dword ptr [edx-000000F7h] 0x00000048 jmp 00007FE5151CE62Ch 0x0000004a mov dword ptr [ebp+04h], eax 0x0000004d mov ax, sp 0x00000050 mov ecx, dword ptr [esp] 0x00000053 jmp 00007FE5151C53DAh 0x00000058 jmp 00007FE5151CE6FEh 0x0000005d xchg eax, ecx 0x0000005e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5150D150Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5150D14B9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5150D138Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5150D13E4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5150D1431h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5150D13DDh 0x0000003d mov cx, word ptr [esp+03h] 0x00000042 lea ecx, dword ptr [edx-000000F7h] 0x00000048 jmp 00007FE5150D141Ch 0x0000004a mov dword ptr [ebp+04h], eax 0x0000004d mov ax, sp 0x00000050 mov ecx, dword ptr [esp] 0x00000053 jmp 00007FE5150C81CAh 0x00000058 jmp 00007FE5150D14EEh 0x0000005d xchg eax, ecx 0x0000005e rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 4428Thread sleep time: -40000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDD74E3 rdtsc 3_2_6CDD74E3
            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 1.4 %
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: rundll32.exe, 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(y
            Source: rundll32.exe, 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
            Source: rundll32.exe, 00000005.00000002.628305974.0000000002FDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

            Anti Debugging

            barindex
            Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
            Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDD74E3 rdtsc 3_2_6CDD74E3
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFF0A4 mov esi, dword ptr fs:[00000030h]0_2_00EFF0A4
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h]0_2_00EF68A2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h]0_2_00EF68A2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h]0_2_00EF68A2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h]0_2_00EF68A2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF68A2 mov ecx, dword ptr fs:[00000030h]0_2_00EF68A2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC806A mov ecx, dword ptr fs:[00000030h]0_2_00EC806A
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC806A mov eax, dword ptr fs:[00000030h]0_2_00EC806A
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF0868 mov eax, dword ptr fs:[00000030h]0_2_00EF0868
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF0868 mov ecx, dword ptr fs:[00000030h]0_2_00EF0868
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC4852 mov eax, dword ptr fs:[00000030h]0_2_00EC4852
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC4852 mov eax, dword ptr fs:[00000030h]0_2_00EC4852
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC7832 mov eax, dword ptr fs:[00000030h]0_2_00EC7832
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC7832 mov eax, dword ptr fs:[00000030h]0_2_00EC7832
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC7832 mov ecx, dword ptr fs:[00000030h]0_2_00EC7832
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECB832 mov eax, dword ptr fs:[00000030h]0_2_00ECB832
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECB832 mov eax, dword ptr fs:[00000030h]0_2_00ECB832
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECB832 mov eax, dword ptr fs:[00000030h]0_2_00ECB832
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEF1E5 mov eax, dword ptr fs:[00000030h]0_2_00EEF1E5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEF1E5 mov eax, dword ptr fs:[00000030h]0_2_00EEF1E5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC01F9 mov eax, dword ptr fs:[00000030h]0_2_00EC01F9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h]0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD mov ecx, dword ptr fs:[00000030h]0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h]0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h]0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h]0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h]0_2_00EBE9FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE69F2 mov eax, dword ptr fs:[00000030h]0_2_00EE69F2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE69F2 mov eax, dword ptr fs:[00000030h]0_2_00EE69F2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB49F4 mov eax, dword ptr fs:[00000030h]0_2_00EB49F4
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB49F4 mov eax, dword ptr fs:[00000030h]0_2_00EB49F4
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB49F4 mov eax, dword ptr fs:[00000030h]0_2_00EB49F4
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC79C1 mov eax, dword ptr fs:[00000030h]0_2_00EC79C1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC79C1 mov eax, dword ptr fs:[00000030h]0_2_00EC79C1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC79C1 mov ecx, dword ptr fs:[00000030h]0_2_00EC79C1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBB9B2 mov eax, dword ptr fs:[00000030h]0_2_00EBB9B2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBB9B2 mov ecx, dword ptr fs:[00000030h]0_2_00EBB9B2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F0696A mov ecx, dword ptr fs:[00000030h]0_2_00F0696A
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F0696A mov ecx, dword ptr fs:[00000030h]0_2_00F0696A
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE936 mov ecx, dword ptr fs:[00000030h]0_2_00EBE936
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBE936 mov eax, dword ptr fs:[00000030h]0_2_00EBE936
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECBAD2 mov eax, dword ptr fs:[00000030h]0_2_00ECBAD2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F05AB5 mov eax, dword ptr fs:[00000030h]0_2_00F05AB5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F05AB5 mov ecx, dword ptr fs:[00000030h]0_2_00F05AB5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F05AB5 mov ecx, dword ptr fs:[00000030h]0_2_00F05AB5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h]0_2_00F12A92
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h]0_2_00F12A92
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h]0_2_00F12A92
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h]0_2_00F12A92
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h]0_2_00EBFA99
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h]0_2_00EBFA99
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h]0_2_00EBFA99
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h]0_2_00EBFA99
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h]0_2_00EBFA99
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEEA01 mov eax, dword ptr fs:[00000030h]0_2_00EEEA01
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEEA01 mov eax, dword ptr fs:[00000030h]0_2_00EEEA01
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEFBFF mov eax, dword ptr fs:[00000030h]0_2_00EEFBFF
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEFBFF mov eax, dword ptr fs:[00000030h]0_2_00EEFBFF
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBBCD mov eax, dword ptr fs:[00000030h]0_2_00EFBBCD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBBCD mov ecx, dword ptr fs:[00000030h]0_2_00EFBBCD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4BAA mov ebx, dword ptr fs:[00000030h]0_2_00EB4BAA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4BAA mov eax, dword ptr fs:[00000030h]0_2_00EB4BAA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4BAA mov ecx, dword ptr fs:[00000030h]0_2_00EB4BAA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4BAA mov eax, dword ptr fs:[00000030h]0_2_00EB4BAA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE53BA mov eax, dword ptr fs:[00000030h]0_2_00EE53BA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE53BA mov eax, dword ptr fs:[00000030h]0_2_00EE53BA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE63B2 cmp dword ptr fs:[00000030h], ebx0_2_00EE63B2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE63B2 mov eax, dword ptr fs:[00000030h]0_2_00EE63B2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE63B2 mov eax, dword ptr fs:[00000030h]0_2_00EE63B2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE63B2 mov eax, dword ptr fs:[00000030h]0_2_00EE63B2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h]0_2_00EC6392
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h]0_2_00EC6392
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h]0_2_00EC6392
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h]0_2_00EC6392
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF0B48 mov eax, dword ptr fs:[00000030h]0_2_00EF0B48
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF0B48 mov ecx, dword ptr fs:[00000030h]0_2_00EF0B48
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE4CEE mov eax, dword ptr fs:[00000030h]0_2_00EE4CEE
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h]0_2_00EFBCF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h]0_2_00EFBCF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h]0_2_00EFBCF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h]0_2_00EFBCF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFBCF9 mov ecx, dword ptr fs:[00000030h]0_2_00EFBCF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFCCC8 mov eax, dword ptr fs:[00000030h]0_2_00EFCCC8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFCCC8 mov ecx, dword ptr fs:[00000030h]0_2_00EFCCC8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFCCC8 mov eax, dword ptr fs:[00000030h]0_2_00EFCCC8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EBD4C2 mov eax, dword ptr fs:[00000030h]0_2_00EBD4C2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F05CCC mov eax, dword ptr fs:[00000030h]0_2_00F05CCC
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F05CCC mov ecx, dword ptr fs:[00000030h]0_2_00F05CCC
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F05CCC mov ecx, dword ptr fs:[00000030h]0_2_00F05CCC
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB6482 mov eax, dword ptr fs:[00000030h]0_2_00EB6482
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB6482 mov eax, dword ptr fs:[00000030h]0_2_00EB6482
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB6482 mov eax, dword ptr fs:[00000030h]0_2_00EB6482
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE5490 mov eax, dword ptr fs:[00000030h]0_2_00EE5490
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE5490 mov ecx, dword ptr fs:[00000030h]0_2_00EE5490
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC4472 mov eax, dword ptr fs:[00000030h]0_2_00EC4472
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC4472 mov eax, dword ptr fs:[00000030h]0_2_00EC4472
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF0428 mov eax, dword ptr fs:[00000030h]0_2_00EF0428
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F12C24 mov eax, dword ptr fs:[00000030h]0_2_00F12C24
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC45F2 mov eax, dword ptr fs:[00000030h]0_2_00EC45F2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC45F2 mov eax, dword ptr fs:[00000030h]0_2_00EC45F2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECBDC9 mov eax, dword ptr fs:[00000030h]0_2_00ECBDC9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE6DD6 mov eax, dword ptr fs:[00000030h]0_2_00EE6DD6
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE6DD6 mov eax, dword ptr fs:[00000030h]0_2_00EE6DD6
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F12DCE mov eax, dword ptr fs:[00000030h]0_2_00F12DCE
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB75A2 mov eax, dword ptr fs:[00000030h]0_2_00EB75A2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFCDA4 mov eax, dword ptr fs:[00000030h]0_2_00EFCDA4
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6598 mov eax, dword ptr fs:[00000030h]0_2_00EC6598
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6598 mov eax, dword ptr fs:[00000030h]0_2_00EC6598
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h]0_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h]0_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h]0_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h]0_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h]0_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h]0_2_00EC8592
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6D2E mov eax, dword ptr fs:[00000030h]0_2_00EC6D2E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6D2E mov eax, dword ptr fs:[00000030h]0_2_00EC6D2E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6D2E mov eax, dword ptr fs:[00000030h]0_2_00EC6D2E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF652C mov eax, dword ptr fs:[00000030h]0_2_00EF652C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EF652C mov ecx, dword ptr fs:[00000030h]0_2_00EF652C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h]0_2_00EC6530
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h]0_2_00EC6530
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h]0_2_00EC6530
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h]0_2_00EC6530
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC7EC1 mov ecx, dword ptr fs:[00000030h]0_2_00EC7EC1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC7EC1 mov eax, dword ptr fs:[00000030h]0_2_00EC7EC1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F066C2 mov eax, dword ptr fs:[00000030h]0_2_00F066C2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F066C2 mov ecx, dword ptr fs:[00000030h]0_2_00F066C2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F066C2 mov ecx, dword ptr fs:[00000030h]0_2_00F066C2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC46A6 mov eax, dword ptr fs:[00000030h]0_2_00EC46A6
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC46A6 mov eax, dword ptr fs:[00000030h]0_2_00EC46A6
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC76B9 mov eax, dword ptr fs:[00000030h]0_2_00EC76B9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC76B9 mov eax, dword ptr fs:[00000030h]0_2_00EC76B9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB5672 mov ecx, dword ptr fs:[00000030h]0_2_00EB5672
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h]0_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h]0_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h]0_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h]0_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h]0_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h]0_2_00EC9E77
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h]0_2_00EC5E72
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h]0_2_00EC5E72
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h]0_2_00EC5E72
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h]0_2_00EC5E72
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEDE22 mov eax, dword ptr fs:[00000030h]0_2_00EEDE22
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEDE22 mov eax, dword ptr fs:[00000030h]0_2_00EEDE22
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE4E20 mov eax, dword ptr fs:[00000030h]0_2_00EE4E20
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECBE22 mov eax, dword ptr fs:[00000030h]0_2_00ECBE22
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECBE22 mov eax, dword ptr fs:[00000030h]0_2_00ECBE22
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00ECBE22 mov eax, dword ptr fs:[00000030h]0_2_00ECBE22
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F03628 mov eax, dword ptr fs:[00000030h]0_2_00F03628
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F03628 mov ecx, dword ptr fs:[00000030h]0_2_00F03628
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB47EF mov eax, dword ptr fs:[00000030h]0_2_00EB47EF
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB47EF mov eax, dword ptr fs:[00000030h]0_2_00EB47EF
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4FE2 mov eax, dword ptr fs:[00000030h]0_2_00EB4FE2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4FE2 mov ecx, dword ptr fs:[00000030h]0_2_00EB4FE2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4FE2 mov eax, dword ptr fs:[00000030h]0_2_00EB4FE2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB7FF9 mov eax, dword ptr fs:[00000030h]0_2_00EB7FF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB7FF9 mov eax, dword ptr fs:[00000030h]0_2_00EB7FF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB7FF9 mov eax, dword ptr fs:[00000030h]0_2_00EB7FF9
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC47AE mov eax, dword ptr fs:[00000030h]0_2_00EC47AE
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEDFA8 mov eax, dword ptr fs:[00000030h]0_2_00EEDFA8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEDFA8 mov ecx, dword ptr fs:[00000030h]0_2_00EEDFA8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEF7B3 mov eax, dword ptr fs:[00000030h]0_2_00EEF7B3
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEF7B3 mov eax, dword ptr fs:[00000030h]0_2_00EEF7B3
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEF7B3 mov eax, dword ptr fs:[00000030h]0_2_00EEF7B3
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F08F94 mov eax, dword ptr fs:[00000030h]0_2_00F08F94
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00F08F94 mov ecx, dword ptr fs:[00000030h]0_2_00F08F94
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB6782 mov eax, dword ptr fs:[00000030h]0_2_00EB6782
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB6782 mov ecx, dword ptr fs:[00000030h]0_2_00EB6782
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB6782 mov eax, dword ptr fs:[00000030h]0_2_00EB6782
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC4F82 mov eax, dword ptr fs:[00000030h]0_2_00EC4F82
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC4F82 mov eax, dword ptr fs:[00000030h]0_2_00EC4F82
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE679A mov eax, dword ptr fs:[00000030h]0_2_00EE679A
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EE679A mov eax, dword ptr fs:[00000030h]0_2_00EE679A
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h]0_2_00EC6F2C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h]0_2_00EC6F2C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h]0_2_00EC6F2C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h]0_2_00EC6F2C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EFA735 mov eax, dword ptr fs:[00000030h]0_2_00EFA735
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB5702 mov eax, dword ptr fs:[00000030h]0_2_00EB5702
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB5702 mov ecx, dword ptr fs:[00000030h]0_2_00EB5702
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EB4702 mov eax, dword ptr fs:[00000030h]0_2_00EB4702
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEFF1E mov eax, dword ptr fs:[00000030h]0_2_00EEFF1E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00EEFF1E mov eax, dword ptr fs:[00000030h]0_2_00EEFF1E
            Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 15.228.77.178 80Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: ebaoffice.com.br
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 187.45.187.42 443Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1Jump to behavior
            Source: loaddll32.exe, 00000000.00000003.538203445.0000000002998000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647510965.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1010130762.0000000004DAA000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
            Source: rundll32.exe, 00000003.00000002.1011503402.0000000005038000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
            Source: loaddll32.exe, 00000000.00000003.538203445.0000000002998000.00000004.00000800.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.647510965.0000000002CD1000.00000040.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1010130762.0000000004DAA000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
            Source: rundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Windows Management Instrumentation
            11
            Registry Run Keys / Startup Folder
            112
            Process Injection
            1
            Masquerading
            21
            Input Capture
            341
            Security Software Discovery
            Remote Services21
            Input Capture
            Exfiltration Over Other Network Medium11
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            11
            Registry Run Keys / Startup Folder
            121
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            DLL Side-Loading
            112
            Process Injection
            Security Account Manager121
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Deobfuscate/Decode Files or Information
            NTDS1
            Remote System Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer13
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets21
            System Information Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Rundll32
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1280994 Sample: SecuriteInfo.com.Variant.Ba... Startdate: 27/07/2023 Architecture: WINDOWS Score: 88 45 Antivirus detection for URL or domain 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Machine Learning detection for sample 2->49 51 PE file has a writeable .text section 2->51 8 loaddll32.exe 1 2->8         started        11 rundll32.exe 2->11         started        13 rundll32.exe 2->13         started        process3 signatures4 53 Tries to evade debugger and weak emulator (self modifying code) 8->53 55 Tries to detect virtualization through RDTSC time measurements 8->55 57 Hides threads from debuggers 8->57 15 rundll32.exe 1 17 8->15         started        19 cmd.exe 1 8->19         started        21 rundll32.exe 14 8->21         started        23 8 other processes 8->23 process5 dnsIp6 33 ebaoffice.com.br 187.45.187.42, 443, 49693 DIMENOCUS Brazil 15->33 35 15.228.77.178, 80 AMAZON-02US United States 15->35 37 System process connects to network (likely due to code injection or exploit) 15->37 39 Creates an autostart registry key pointing to binary in C:\Windows 15->39 41 Tries to detect virtualization through RDTSC time measurements 15->41 25 rundll32.exe 19->25         started        43 Hides threads from debuggers 21->43 signatures7 process8 signatures9 59 Hides threads from debuggers 25->59 28 WerFault.exe 20 9 25->28         started        process10 dnsIp11 31 192.168.2.1 unknown unknown 28->31

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll58%ReversingLabsWin32.Trojan.Barys
            SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll63%VirustotalBrowse
            SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            ebaoffice.com.br2%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://www.indyproject.org/0%URL Reputationsafe
            http://crl.micro0%URL Reputationsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phps/bo/inspecionando.phpo.php0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpcU0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpL0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpV0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phporyHistory.IE50%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpe0%Avira URL Cloudsafe
            https://ebaoffice.com.br/t0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpr0%Avira URL Cloudsafe
            https://ebaoffice.com.br/m%0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php20%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpp0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpz0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php90%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php40%Avira URL Cloudsafe
            https://ebaoffice.com.br/0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php60%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpx0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phputllib.dll.DLL0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php...0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php_sC:0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpHistory0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.php100%Avira URL Cloudmalware
            https://ebaoffice.com.br/imagens/bo/inspecionando.ph0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpF0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpH0%Avira URL Cloudsafe
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpofRA0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ebaoffice.com.br
            187.45.187.42
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            https://ebaoffice.com.br/imagens/bo/inspecionando.phptrue
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpcUrundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpLrundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpVrundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phps/bo/inspecionando.phpo.phprundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phporyHistory.IE5rundll32.exe, 00000003.00000002.1007804691.0000000002CF0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/trundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.indyproject.org/rundll32.exe, rundll32.exe, 00000003.00000002.1014696634.000000006AF59000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1011503402.0000000004FD0000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.742376267.000000006AF59000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.725061641.0000000005200000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.704747309.000000006AF59000.00000040.00000001.01000000.00000003.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phperundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.php2rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.000000000301F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phprrundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpprundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/m%rundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.microrundll32.exe, 00000003.00000002.1013104330.0000000007010000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpzrundll32.exe, 00000005.00000002.628305974.000000000301F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.php9rundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpxrundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FE6000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/rundll32.exe, 00000003.00000002.1007804691.0000000002D46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.php6rundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.php4rundll32.exe, 00000005.00000002.628239248.0000000000A55000.00000004.00000010.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phputllib.dll.DLLrundll32.exe, 00000005.00000002.628239248.0000000000A55000.00000004.00000010.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.php...rundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.php_sC:rundll32.exe, 00000003.00000002.1013104330.0000000007010000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpHistoryrundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phrundll32.exe, 00000003.00000002.1013104330.0000000007010000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpHrundll32.exe, 00000003.00000002.1007804691.0000000002D90000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpFrundll32.exe, 00000005.00000002.628305974.0000000002FEC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ebaoffice.com.br/imagens/bo/inspecionando.phpofRArundll32.exe, 00000003.00000002.1007804691.0000000002D5B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            15.228.77.178
            unknownUnited States
            16509AMAZON-02UStrue
            187.45.187.42
            ebaoffice.com.brBrazil
            33182DIMENOCUStrue
            IP
            192.168.2.1
            Joe Sandbox Version:38.0.0 Beryl
            Analysis ID:1280994
            Start date and time:2023-07-27 11:42:11 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 15m 16s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:20
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample file name:SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll
            Detection:MAL
            Classification:mal88.evad.winDLL@27/7@1/3
            EGA Information:
            • Successful, ratio: 50%
            HDC Information:Failed
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .dll
            • Override analysis time to 240s for rundll32
            • Exclude process from analysis (whitelisted): WerFault.exe, WMIADAP.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 20.189.173.20
            • Excluded domains from analysis (whitelisted): blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, watson.telemetry.microsoft.com
            • Execution Graph export aborted for target loaddll32.exe, PID 5292 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            11:44:12API Interceptor1x Sleep call for process: rundll32.exe modified
            11:44:17API Interceptor1x Sleep call for process: loaddll32.exe modified
            11:44:47API Interceptor1x Sleep call for process: WerFault.exe modified
            11:44:58AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe C:\Windows\SysWOW64\rundll32.exe
            11:45:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe C:\Windows\SysWOW64\rundll32.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            15.228.77.178f_4_T_u_r_4_34536_45645_3345_wo.msiGet hashmaliciousUnknownBrowse
              n_f_3_e_l_3_t_r_0_n_1_k_4_00545.msiGet hashmaliciousUnknownBrowse
                n_f_3_f_1_s_k_4_l.msiGet hashmaliciousUnknownBrowse
                  Mandado-Intima#U00e7#U00e3o_Art516mlhg.msiGet hashmaliciousUnknownBrowse
                    z12A____o-Trabalhista.msiGet hashmaliciousUnknownBrowse
                      z1F_4_T_U_r_4_2024mfdfgryry5.msiGet hashmaliciousUnknownBrowse
                        F_4_T_U_R_4___nf____0992344.4354.msiGet hashmaliciousUnknownBrowse
                          rPEDIDOS-10032023-X491kkum.msiGet hashmaliciousUnknownBrowse
                            z93nf_e_mnhhh345553.msiGet hashmaliciousUnknownBrowse
                              z1n_f_e_Fa_tu_r4_03.msiGet hashmaliciousUnknownBrowse
                                PEDIDOS-08032023-X388omke.msiGet hashmaliciousUnknownBrowse
                                  Nota-LG-emitida-13488mhqt.msiGet hashmaliciousUnknownBrowse
                                    __B0L3T0_06Marc_23_f4tur4__.msiGet hashmaliciousUnknownBrowse
                                      __B0L3T0_06Marc_23_f4tur4__.msiGet hashmaliciousUnknownBrowse
                                        rPedido-Danfe-03-03-202316872pnlc.msiGet hashmaliciousUnknownBrowse
                                          Autos-Processo 27-02-2023 ligh.msiGet hashmaliciousUnknownBrowse
                                            rEmita-Danfe-01-03-20234076czdg.msiGet hashmaliciousUnknownBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ebaoffice.com.brf_4_T_u_r_4_34536_45645_3345_wo.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              n_f_3_e_l_3_t_r_0_n_1_k_4_00545.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              n_f_3_f_1_s_k_4_l.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              z1F_4_T_U_r_4_2024mfdfgryry5.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              F_4_T_U_R_4___nf____0992344.4354.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              z93nf_e_mnhhh345553.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              z1n_f_e_Fa_tu_r4_03.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              __B0L3T0_06Marc_23_f4tur4__.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              __B0L3T0_06Marc_23_f4tur4__.msiGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              AMAZON-02USVj9IqABtkW.exeGet hashmaliciousNjratBrowse
                                              • 3.121.139.82
                                              CBaxoveJtw.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 13.248.169.48
                                              http://gvehealth.com/2681688if6964650sh583289000KO14098WL2LCu185894sAGet hashmaliciousUnknownBrowse
                                              • 54.184.24.62
                                              https://b9halom2.page.link/dmCnGet hashmaliciousUnknownBrowse
                                              • 3.71.149.231
                                              PO_DP-06423.xlam.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.224.103.58
                                              FACTURA_53769.xlam.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.224.103.129
                                              IMG_3846.JPG.........................scr.exeGet hashmaliciousAveMariaBrowse
                                              • 3.135.209.48
                                              doc_pago_de_la_factura_11-369013.xlam.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.224.103.129
                                              cenov#U00e1_nab#U00eddka_a_specifikace.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.224.103.129
                                              http://staging.talentegg.ca/redirect/company/1838/54828?destination=https://SWISSLIFE.fklavye.org.tr/dmF0LnNlcnZpY2VzQHN3aXNzbGlmZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                              • 18.190.15.219
                                              https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=twinmotionGet hashmaliciousUnknownBrowse
                                              • 13.225.78.57
                                              New_Order_Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.224.103.87
                                              http://t.1800petmeds.com/track?t=c&mid=26061&eid=LORI@NEXTSTEPMINISTRIES.NET&extra=2&&&http://w1ph62.aynacigold.com/RHVsbGFoLk1hemxhbkBkZW1lLm9ubWljcm9zb2Z0LmNvbQ==Get hashmaliciousUnknownBrowse
                                              • 3.127.67.224
                                              http://t.1800petmeds.com/track?t=c&mid=26061&eid=LORI@NEXTSTEPMINISTRIES.NET&extra=2&&&http://w1ph62.aynacigold.com/RHVsbGFoLk1hemxhbkBkZW1lLm9ubWljcm9zb2Z0LmNvbQ==Get hashmaliciousUnknownBrowse
                                              • 3.127.67.224
                                              Endpoint Agent for Architects , Inc-x64-1.166.1.msiGet hashmaliciousUnknownBrowse
                                              • 99.83.250.143
                                              system32.vbsGet hashmaliciousAgentTeslaBrowse
                                              • 108.138.36.12
                                              https://mg3260068.cc/index.html?shareName=mg3260068.ccGet hashmaliciousUnknownBrowse
                                              • 108.138.7.4
                                              message_zdm.htmlGet hashmaliciousUnknownBrowse
                                              • 65.9.66.24
                                              u1LwUkKDIF.exeGet hashmaliciousNjratBrowse
                                              • 18.157.68.73
                                              https://disq.us/url?url=https%3A%2F%2Fieseainela-al.com%2F%3AsseHnNRH9eimVvdyXoRGEoL_wz4&cuid=2751344Get hashmaliciousUnknownBrowse
                                              • 3.138.114.145
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              37f463bf4616ecd445d4a1937da06e19Remittance_copy.exeGet hashmaliciousGuLoader, LokibotBrowse
                                              • 187.45.187.42
                                              Invoices.lnkGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              Payment_Document.lnkGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              pikabot_core.dllGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              pikabot_core.dllGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              SecuriteInfo.com.Trojan.Heur2.sNW@If4VDppi.27877.25664.exeGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              SecuriteInfo.com.Adware.Zaxar.111.16621.29357.dllGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              1.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                              • 187.45.187.42
                                              kMyL3tnxhT.exeGet hashmaliciousSmokeLoader, VidarBrowse
                                              • 187.45.187.42
                                              0acR8HLrwO.exeGet hashmaliciousVidarBrowse
                                              • 187.45.187.42
                                              New_Inquiry_List.exeGet hashmaliciousGuLoaderBrowse
                                              • 187.45.187.42
                                              lllll.bin.exeGet hashmaliciousAresLoaderBrowse
                                              • 187.45.187.42
                                              NOUVELLE_COMMANDE_-pdf.exeGet hashmaliciousGuLoaderBrowse
                                              • 187.45.187.42
                                              Yfq7dvvNOA.exeGet hashmaliciousBabuk, DjvuBrowse
                                              • 187.45.187.42
                                              NOUVELLE_COMMANDE_-pdf.exeGet hashmaliciousGuLoaderBrowse
                                              • 187.45.187.42
                                              Csz05luwlg.exeGet hashmaliciousUnknownBrowse
                                              • 187.45.187.42
                                              copia_de_la_transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 187.45.187.42
                                              IAENMAIL.-A4-230726-0830-0002632.pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                              • 187.45.187.42
                                              Sis.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 187.45.187.42
                                              CamScanner_07-25-2023.vbsGet hashmaliciousRemcosBrowse
                                              • 187.45.187.42
                                              No context
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.0274019958106573
                                              Encrypted:false
                                              SSDEEP:192:ibii0oXuHBUZMX4jed+ysKCT/u7s5S274ItWc:mikXmBUZMX4jeK/u7s5X4ItWc
                                              MD5:7402F3022E19CD11599584AA0125786D
                                              SHA1:A334120E4485087CF126A52B80D36A3A9DD12004
                                              SHA-256:FCA2337A9CBAF7230E945970CCCB539E0913A7AF2EE91D5E45090E60EA71C83B
                                              SHA-512:2FA3D596F072B4E0453364D5E15C20CE1565A0737FD6B4480EE1DD896C38DA3A700B71D98EF96B0F9ADED8E3EDCB13E00A0BE643909A4B23149CE0BD50391BEF
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.4.9.5.7.0.5.4.1.9.5.3.4.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.4.9.5.7.0.7.5.3.5.1.5.8.5.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.a.d.9.9.8.b.-.3.9.b.1.-.4.e.4.f.-.8.4.9.2.-.c.3.a.8.9.3.c.6.9.2.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.e.9.a.7.e.e.2.-.f.f.8.4.-.4.9.8.b.-.9.a.1.a.-.0.6.a.f.e.5.4.c.3.6.1.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.d.c.-.0.0.0.1.-.0.0.1.a.-.b.4.3.5.-.a.5.3.1.b.a.c.0.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Thu Jul 27 18:44:18 2023, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):54192
                                              Entropy (8bit):2.044825611858494
                                              Encrypted:false
                                              SSDEEP:192:wJEKlat5e8DicLA/O5SkbB3v46rOs+Txtk1cxN4Fc+nmJ6:QUiQA25LbBf465+TLxN4bm
                                              MD5:41E1B6419A241BC8F80CBF24C2822729
                                              SHA1:C088F90A1E9D03DA383C16ADD3C989CB3AA41134
                                              SHA-256:0902920F8D58392A3F7D71B27A075CD1F9CEA30D65894BAE424A902429AF4582
                                              SHA-512:E43FC5D7C215F6B01AFCC97AF78BB35CF91CD790D5BE62F8506D0C5D02952A93B280A101F4D332D1F2E60DC8172E785B33E5956FFF001825EAE0CC433EDFD706
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:MDMP....... ..........d....................................4....7..........T.......8...........T...........p...@........................!...................................................................U...........B......`"......GenuineIntelW...........T..............d.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8368
                                              Entropy (8bit):3.6956025732554405
                                              Encrypted:false
                                              SSDEEP:192:Rrl7r3GLNiC+6IS6Yv667VgmfThSICpri89bw0sfYvwm:RrlsNiT6V6Yi67VgmfThSLwnf+
                                              MD5:43A173FB5CA0B9526AA5FB63A72D6E8A
                                              SHA1:A688AF45822F91ABB9F98F07B65BCA135415170B
                                              SHA-256:23F24F1C0E965819956FE4F68FB833B113B8BCF946BA8B4677DC234484D74C00
                                              SHA-512:33648829A01B4B9AD7D746D8C1CE9C1BCB0C8362D9298EEACA42246713BB2F43153AD0916EC79A568F912553FAAD38B66D3F5589F3AA5E550DB4182B95917AED
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.6.4.<./.P.i.d.>.......
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4722
                                              Entropy (8bit):4.4924221060878144
                                              Encrypted:false
                                              SSDEEP:48:cvIwSD8zs/JgtWI9YuWgc8sqYjLn8fm8M4JCdsr8kFyoX+q8/Wer+A4SrSgd:uITfhjPgrsqYMJx8aBeHDWgd
                                              MD5:50DFAFDED6981EDD63A81C5A271347C6
                                              SHA1:A4F84B512E262AC937CF7601FA3C656EBF5A8807
                                              SHA-256:900F8CB2B9901A4C23912D3C90468C5E1D1B29F8579AC4DB74685368C7FA496D
                                              SHA-512:8F9E2F34F002F85B3ACA9689832259612E3A99BC51D73F0193D71E5006F2C55AB05A38F5B8D4DC65788B1BBB29D03CEF4F9B2690D21A6CA97E9609FC4F858BC7
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2147274" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):32
                                              Entropy (8bit):4.304229296672175
                                              Encrypted:false
                                              SSDEEP:3:1EypylDPG3y:1XpyA3y
                                              MD5:826568E057E1BCB36A1B75B08F0D32A4
                                              SHA1:2121022E539E3EB46CC61606088393A2E1043230
                                              SHA-256:53C745A5E88554008A5237C01000424A296DF5BCEED3C879B646932B86590531
                                              SHA-512:148E83CD24A1C78AE4F645253DDC2FDDA90FA66258960117B54CEEEE38775D0749416C182CF13FCB08C33F19C5937EBC92AE4DFBCFC90D6E67D867AC9A25BBD8
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:[Generate Pasta]..hhBLffjcZgot..
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):1572864
                                              Entropy (8bit):4.293789859628353
                                              Encrypted:false
                                              SSDEEP:12288:SeePciY+chVEIriJrHiKBuO6TBinDhs9GaiZVe0YsOAmjqEVIXE4dieA:zePciY+chVHriJzAEVeF
                                              MD5:F353A200E88D1DD24BAB026FEF804E05
                                              SHA1:51C7E1D3EEAC37C4EED9AFC08E57E3438D42B9D0
                                              SHA-256:854030B7A067CA36E015B9934E9F43271F83D07A46D82239B48C2161939D6717
                                              SHA-512:96874ECCAED1F9D11EBB73CD5ED2B18C92006981F0BA30F7E211AF90899A0FB4B04E1E3B7836451C031F69C5DB6A63AD2632EFA5018B208FFA922E150BE02298
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:regf^...^...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm...T................................................................................................................................................................................................................................................................................................................................................P0..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):24576
                                              Entropy (8bit):3.7713595974354632
                                              Encrypted:false
                                              SSDEEP:384:Oe5/+/llYBA+3w6rINn88MTVgGbG+GODvkZJRUpM:Ow/+/llUA+HW88qVgGCkDvMUp
                                              MD5:72DB247B6590FFA6A343B30730AB2218
                                              SHA1:EDA831724A0B6FFCB6EA61AA5E99EFD7ECD9903D
                                              SHA-256:F1D47C6DF9B505CD5AC1228891E1A4AD78FB6B07D79C412B04483C79CFCBE7C2
                                              SHA-512:A616C9F08254E7FFDDE416954C77DE77067F8A87F4008A7B01941CE6A6B729B4802B48E94442A4EBD0FADA58F901D36636A08B75EC3FF0B9328DE0E8637AB2EB
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:regf]...]...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm...T................................................................................................................................................................................................................................................................................................................................................V0..HvLE.^......]...........9._..'..w.E/.'(F............................. ..hbin................p.\..,..........nk,.`C.T.................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .`C.T........ ........................... .......Z.......................Root........lf......Root....nk .`C.T.....................}.............. ...............*...............DeviceCensus........................vk..................WritePermissionsCheck...
                                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.865740040086561
                                              TrID:
                                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.40%
                                              • Win16/32 Executable Delphi generic (2074/23) 0.21%
                                              • Generic Win/DOS Executable (2004/3) 0.20%
                                              • DOS Executable Generic (2002/1) 0.20%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll
                                              File size:7'131'136 bytes
                                              MD5:d4257a85611eb9b8fc7da98ad7cd3b4c
                                              SHA1:10a8821bd70d4afa52388ca04480085b98ac9227
                                              SHA256:a7d13b0ae56c9d7759c0c20a5ea515760dffa8ea4fa366f9092e901b4579499b
                                              SHA512:396355dcb832bbd42bc6cf59e674cd984d1f025b857b35cd707f46657171b6163bc92a2eb55f652d250c13429960369a5f080d44b854148c98018e0dbd561a15
                                              SSDEEP:98304:waK8LG5Sz5CeP4BgLvNb5++Y+wUJ/0Z7mB2tNlXC6vbrFsVBnQgtCnoy:Jtw+6AdjZR4tTXCGNsVB3Coy
                                              TLSH:3576120FE85F8E7BF95B35BBD8A6907BC1620841A6A19DD0A75586C133E737206CF381
                                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                              Icon Hash:7ae282899bbab082
                                              Entrypoint:0x269e13c
                                              Entrypoint Section:.sedata
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x640A145F [Thu Mar 9 17:16:15 2023 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:09c711a9d8dffafaecc3bc1dbbc1f663
                                              Instruction
                                              call 00007FE514C77A31h
                                              push ebx
                                              popad
                                              outsb
                                              imul ebp, dword ptr [bp+65h], 69685320h
                                              insb
                                              outsb
                                              and byte ptr [esi+32h], dh
                                              xor al, 2Eh
                                              xor byte ptr [esi], ch
                                              xor byte ptr [eax], al
                                              pushfd
                                              stc
                                              jmp 00007FE514C7797Ch
                                              adc dh, FFFFFF93h
                                              mov dl, byte ptr [esp+04h]
                                              bsf dx, si
                                              mov ch, 03h
                                              jmp 00007FE514C77A7Ah
                                              cmc
                                              bound esi, dword ptr [eax]
                                              xchg eax, edi
                                              bound ecx, dword ptr [ebx]
                                              xor eax, A15237A7h
                                              sbb al, 5Ah
                                              mov dword ptr [ebx], eax
                                              popad
                                              jmp 00007FE514C6A79Bh
                                              xchg cl, dl
                                              bsr ecx, esi
                                              sub esp, 14h
                                              push word ptr [esp+22h]
                                              mov ch, 68h
                                              lea edx, dword ptr [00000000h+eax*4]
                                              jmp 00007FE514C77A34h
                                              mov byte ptr [3FCCA535h], al
                                              xchg eax, esp
                                              mov esp, 2ED3B426h
                                              cdq
                                              xlatb
                                              mov dword ptr [esp+02h], ebp
                                              push dword ptr [esp+0Ch]
                                              pop dx
                                              pop word ptr [esp+04h]
                                              bswap ecx
                                              mov cl, dl
                                              jmp 00007FE514C779D8h
                                              mov ch, 3Fh
                                              mov edx, ebx
                                              or ecx, edx
                                              mov edx, esp
                                              xor ecx, ebp
                                              xchg word ptr [esp+04h], cx
                                              jmp 00007FE514C77A43h
                                              daa
                                              mov esp, 6DC43552h
                                              or dword ptr [eax-08992C75h], ebp
                                              ror dword ptr [edi], 1
                                              mov bl, E9h
                                              mov dh, byte ptr [esp+0Ah]
                                              mov ecx, dword ptr [esp+01h]
                                              cld
                                              jmp 00007FE514C779D1h
                                              bswap edx
                                              push dword ptr [esp+06h]
                                              not dh
                                              lea esp, dword ptr [esp+09h]
                                              stc
                                              std
                                              jmp 00007FE514C77A2Eh
                                              retf
                                              bound ebx, dword ptr [ebp+00C6FFECh]
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x22930260x5e99.sedata
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x234b0c40x154.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x234c0000x600.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x234d0000x394.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x21820000x502e00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .sedata0x21830000x1c80000x1c7e00False0.6162363757883191data7.114902610616691IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .idata0x234b0000x10000x600False0.3346354166666667data3.575155469094621IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x234c0000x10000x600False0.3463541666666667data2.8971265676761537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .reloc0x234d0000x10000x400False0.7158203125data5.315543381569861IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              .sedata0x234e0000x10000x1000False0.78173828125data7.9836033077698IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x234c0580x458dataEnglishUnited States0.43884892086330934
                                              DLLImport
                                              shlwapi.dllSHCreateStreamOnFileW
                                              winspool.drvDocumentPropertiesW
                                              comctl32.dllImageList_GetImageInfo
                                              shell32.dllSHGetFolderPathW
                                              user32.dllMoveWindow
                                              version.dllGetFileVersionInfoSizeW
                                              oleaut32.dllSafeArrayPutElement
                                              advapi32.dllRegSetValueExW
                                              msvcrt.dllmemcpy
                                              kernel32.dllSetFileAttributesW
                                              wsock32.dllgethostbyaddr
                                              ole32.dllOleRegEnumVerbs
                                              gdi32.dllPie
                                              Magnification.dllMagSetWindowSource
                                              IPHLPAPI.DLLGetInterfaceInfo
                                              PSAPI.DLLGetMappedFileNameW
                                              NameOrdinalAddress
                                              PyArg_Parse6690x7ff0f8
                                              PyArg_ParseTuple6680x7ff0f8
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jul 27, 2023 11:44:13.477447033 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:13.477518082 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:13.477627993 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:14.649091959 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:14.649169922 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:15.347961903 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:15.348211050 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:18.477387905 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:18.477463007 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:18.477884054 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:18.478035927 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:18.482595921 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:18.528301001 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:19.123910904 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:19.124007940 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:19.124049902 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:19.124089003 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:19.257991076 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:19.258075953 CEST44349693187.45.187.42192.168.2.6
                                              Jul 27, 2023 11:44:19.258101940 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:19.258255959 CEST49693443192.168.2.6187.45.187.42
                                              Jul 27, 2023 11:44:31.198245049 CEST4969480192.168.2.615.228.77.178
                                              Jul 27, 2023 11:44:34.244177103 CEST4969480192.168.2.615.228.77.178
                                              Jul 27, 2023 11:44:40.244678020 CEST4969480192.168.2.615.228.77.178
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jul 27, 2023 11:44:13.058563948 CEST5310753192.168.2.68.8.8.8
                                              Jul 27, 2023 11:44:13.422763109 CEST53531078.8.8.8192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jul 27, 2023 11:44:13.058563948 CEST192.168.2.68.8.8.80x6c69Standard query (0)ebaoffice.com.brA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jul 27, 2023 11:44:13.422763109 CEST8.8.8.8192.168.2.60x6c69No error (0)ebaoffice.com.br187.45.187.42A (IP address)IN (0x0001)false
                                              • ebaoffice.com.br
                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              0192.168.2.649693187.45.187.42443C:\Windows\SysWOW64\rundll32.exe
                                              TimestampkBytes transferredDirectionData
                                              2023-07-27 09:44:18 UTC0OUTGET /imagens/bo/inspecionando.php HTTP/1.1
                                              Accept: */*
                                              Accept-Language: en-US
                                              Accept-Encoding: gzip, deflate
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                              Host: ebaoffice.com.br
                                              Connection: Keep-Alive
                                              2023-07-27 09:44:19 UTC0INHTTP/1.1 200 OK
                                              Connection: close
                                              x-powered-by: PHP/5.6.40
                                              content-type: text/html; charset=UTF-8
                                              cache-control: public, max-age=0
                                              expires: Thu, 27 Jul 2023 09:44:19 GMT
                                              content-length: 0
                                              date: Thu, 27 Jul 2023 09:44:19 GMT
                                              server: LiteSpeed
                                              x-ua-compatible: IE=Edge,chrome=1
                                              alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:11:43:11
                                              Start date:27/07/2023
                                              Path:C:\Windows\System32\loaddll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll"
                                              Imagebase:0xfc0000
                                              File size:126'464 bytes
                                              MD5 hash:3B4636AE519868037940CA5C4272091B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.647753651.0000000002EC7000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high

                                              Target ID:1
                                              Start time:11:43:11
                                              Start date:27/07/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6da640000
                                              File size:625'664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:2
                                              Start time:11:43:11
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1
                                              Imagebase:0x1b0000
                                              File size:232'960 bytes
                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:3
                                              Start time:11:43:11
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_Parse
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.1009274858.0000000004BB1000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high

                                              Target ID:4
                                              Start time:11:43:11
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",#1
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000004.00000002.695693538.0000000004DDF000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high

                                              Target ID:5
                                              Start time:11:43:15
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTuple
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000002.629386243.0000000004F13000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:6
                                              Start time:11:43:18
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll,PyArg_ParseTupleAndKeywords
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000006.00000002.629611134.0000000004A99000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:10
                                              Start time:11:44:09
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6364 -s 748
                                              Imagebase:0xd90000
                                              File size:434'592 bytes
                                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:11
                                              Start time:11:44:16
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_Parse
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.822158662.0000000004B44000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:12
                                              Start time:11:44:16
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTuple
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.832391096.0000000004E0F000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:13
                                              Start time:11:44:16
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",PyArg_ParseTupleAndKeywords
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.829864923.0000000004818000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:14
                                              Start time:11:44:17
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.831439500.00000000053CE000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:15
                                              Start time:11:44:17
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000F.00000002.832575325.0000000005356000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:16
                                              Start time:11:44:17
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Barys.394881.27394.14169.dll",dbkFCallWrapperAddr
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000002.831948932.00000000049B3000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security

                                              Target ID:18
                                              Start time:11:45:14
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\SysWOW64\rundll32.exe"
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language

                                              Target ID:19
                                              Start time:11:45:27
                                              Start date:27/07/2023
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\SysWOW64\rundll32.exe"
                                              Imagebase:0xb20000
                                              File size:61'952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language

                                              Reset < >
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76221ce9149c8e56c1cfba76da75eba39b47cca5eec8a9f6d7bf8016c54b0083
                                                • Instruction ID: 4007ea61ca8c9c0122e37d39675640fafc741dad20ac49598ed8a67927c8b656
                                                • Opcode Fuzzy Hash: 76221ce9149c8e56c1cfba76da75eba39b47cca5eec8a9f6d7bf8016c54b0083
                                                • Instruction Fuzzy Hash: A0D01CB300020DBBCF028E81DC01EDA3F2AEB58370F048200BE38420A0C632C8B1ABA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1c3833c465e31e54419c99de032110fc6b3bcdac4ebdd5fd0586de9e62d08e40
                                                • Instruction ID: e7f81ee95e6ae20909a2506fdbed3afacf6b7089a2a7dfab40627ec4b2061e78
                                                • Opcode Fuzzy Hash: 1c3833c465e31e54419c99de032110fc6b3bcdac4ebdd5fd0586de9e62d08e40
                                                • Instruction Fuzzy Hash: 87C04C3600410DFB8F115F81DC04C8A7F2AEB98760B008011F918051209B32D921FB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $Hlt$,Hlt$8Hlt$@Hlt$LHlt$THlt$`Hlt$hHlt$Glt
                                                • API String ID: 0-1816520126
                                                • Opcode ID: 4b72775c5afa9f86b6523b1e7b69273e340736753df56405ec07ced8b2113d40
                                                • Instruction ID: 621845f698092e619b4d49320436a02530972db41d0ed5b5245a6d57a2c35432
                                                • Opcode Fuzzy Hash: 4b72775c5afa9f86b6523b1e7b69273e340736753df56405ec07ced8b2113d40
                                                • Instruction Fuzzy Hash: F8128070108381CFD314DF65C654BAFB7E1AF92308F24985DF4A6A6292DB72D94BCB12
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $9$B
                                                • API String ID: 0-1781792629
                                                • Opcode ID: 415cfea9f72da266808b45a75c7aae0d48349e87f224eb30cb7e63c57ff99a78
                                                • Instruction ID: 20182a1f33d87e109dba346088394f894607f682d2a95c4f912ae334cdbc4b3b
                                                • Opcode Fuzzy Hash: 415cfea9f72da266808b45a75c7aae0d48349e87f224eb30cb7e63c57ff99a78
                                                • Instruction Fuzzy Hash: 3DB248759012298FDB24DF28CC88BEAB7B4EF48705F1451EAE949E7291E7349E81CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $ $@
                                                • API String ID: 0-2546599590
                                                • Opcode ID: df3da9f04aedbca4981093da9db06e044588d19ec28e31ce6f100bafaca01d0f
                                                • Instruction ID: 2c71773aee90fc29e5e64495e61a8d9e37710b24f40867bdc8755b323639265d
                                                • Opcode Fuzzy Hash: df3da9f04aedbca4981093da9db06e044588d19ec28e31ce6f100bafaca01d0f
                                                • Instruction Fuzzy Hash: 90F1DC712047499FD725CF24C848AABBBF9EF89314F100A1EF692D72A1D770E905CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: lSlt
                                                • API String ID: 0-2691602112
                                                • Opcode ID: a4d822df2cdb7a6a41096de6da3940a402fcaf10716c0e3e5e807252971e555c
                                                • Instruction ID: 8ca2ba5e7c090f259122bbbe33b8eda1c483b6f6e7dbdf6048d28340e07e399b
                                                • Opcode Fuzzy Hash: a4d822df2cdb7a6a41096de6da3940a402fcaf10716c0e3e5e807252971e555c
                                                • Instruction Fuzzy Hash: DDF26071A012299BDB24DF14CE88BA9B7B1FF48314F1591D9E80DBB251DB35AE82CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: lSlt
                                                • API String ID: 0-2691602112
                                                • Opcode ID: f05221507bc6b116ca4d75ba6ccf0938e7901817d1f78a40583488d2b872cec6
                                                • Instruction ID: ef63b8c3381cc7dd084bf0bca8221f1a0f47e75420c20be180f8de09ff820091
                                                • Opcode Fuzzy Hash: f05221507bc6b116ca4d75ba6ccf0938e7901817d1f78a40583488d2b872cec6
                                                • Instruction Fuzzy Hash: 6FF26071A012299BCB24DF14CD89BA9B7B1FF48314F1991E9E809BB251D735EE82CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $X
                                                • API String ID: 0-3124218145
                                                • Opcode ID: 39917a07416785ae6d2f49bc6cb894ffcbef489f26d48ed354ed69fd2ea3f90e
                                                • Instruction ID: 5e140cc1a8d78fc8cf326ec0a5bba6cc8f4c6c68db3d29f2cc2c5f068cb55005
                                                • Opcode Fuzzy Hash: 39917a07416785ae6d2f49bc6cb894ffcbef489f26d48ed354ed69fd2ea3f90e
                                                • Instruction Fuzzy Hash: 4AE15975D01698DFCF28CF9AD88469DBBF5BF88704F25916AE808BB315E7708841CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: 4da5485a55cb3aa2ae2f8cba77c865a58bde490fb729d4a7e4f262186b7202b8
                                                • Instruction ID: 47efba15809c6794d1bfc69d1ddabb13e059ef263567d90bd185d26e2906b4f6
                                                • Opcode Fuzzy Hash: 4da5485a55cb3aa2ae2f8cba77c865a58bde490fb729d4a7e4f262186b7202b8
                                                • Instruction Fuzzy Hash: E632FFB56083818FD325CF29C590B9BBBE4BF88304F10592EE999D7390EB71E945CB52
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: 718b89db43c0e83fe2ce3db78399e708d4e5364c16a84fd74319655b70d212ab
                                                • Instruction ID: ab0572adbc313084f6b9d21d6844313eef2c08dc8c9d95d5b789bd6ed3fcc658
                                                • Opcode Fuzzy Hash: 718b89db43c0e83fe2ce3db78399e708d4e5364c16a84fd74319655b70d212ab
                                                • Instruction Fuzzy Hash: 36B15BB2D0026D9BDB20CFA6DC44AEEBBB8FF08304F144169E906F7250E7749945DBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-4194326291
                                                • Opcode ID: a5426d511227e7771315952c4834f005e4b8896d5d936945ab17bd4ca75fa443
                                                • Instruction ID: 3160fa3df3ae9ea9d61955d5fe78619af7c6c58a47705754887d24f140f28623
                                                • Opcode Fuzzy Hash: a5426d511227e7771315952c4834f005e4b8896d5d936945ab17bd4ca75fa443
                                                • Instruction Fuzzy Hash: D35106B1900658EFDB219FE5CC48AEFBFB9FF88704F000029F546AA1A5C7719915DB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: e48d8a628b2f510027a265858f9581b23096abe57576db1e7ba174250549a8a0
                                                • Instruction ID: 3b45a1e6af22b4b45e3363ca6a73f61517d76d00aa9325a03d679ba546262092
                                                • Opcode Fuzzy Hash: e48d8a628b2f510027a265858f9581b23096abe57576db1e7ba174250549a8a0
                                                • Instruction Fuzzy Hash: AC517075A4021CAFCB20DF55DC89BEAB7B8EF48704F0000A9E609E6260D775AE41DF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: cd5baf636eae51ac80f5b815d63bcf454f93168143bc52943fbae7c57955e35d
                                                • Instruction ID: a482590de361ce5c9231c827ebca96b6d8b72dcf9861a77cf9b83e629781070a
                                                • Opcode Fuzzy Hash: cd5baf636eae51ac80f5b815d63bcf454f93168143bc52943fbae7c57955e35d
                                                • Instruction Fuzzy Hash: 2A41C671E41618ABEB109B94CC89FAFBB79EB44B10F000125F905B72C1D7B5DD05AFA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: 1c838acafb7b8b9f945214dcbbab9e24891b058f7d65c11d6afaf8f9390cd3df
                                                • Instruction ID: cb0c69b75dfbea9fcea1c2845bda47d4da49efcaf32a36c45d24cf55d06355b2
                                                • Opcode Fuzzy Hash: 1c838acafb7b8b9f945214dcbbab9e24891b058f7d65c11d6afaf8f9390cd3df
                                                • Instruction Fuzzy Hash: 37417FB6900619AFDB21CBA8C954FAEB7B8EB48724F100119F911F72D0D731DE02DB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: 7eece1a60eac6d740c7122c2e3140c9b43bedef13adaf06a62c9a669eec5ea86
                                                • Instruction ID: 32b81e33b30b3b0b24bca448a601e8066388381bb79050eeb8547fe166f8ca41
                                                • Opcode Fuzzy Hash: 7eece1a60eac6d740c7122c2e3140c9b43bedef13adaf06a62c9a669eec5ea86
                                                • Instruction Fuzzy Hash: 4A418935A0020CEFDF158F95CD84EEEBBB6EB88324F104169F918A3261C632DD52DB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: 4a0eef0986038a9280786b730bf4ed210299aa9c6d3afa4c388c8f318b6d1a2a
                                                • Instruction ID: 52e5ce5f60ef42422f3865104d0b041e6b5becdb1d84748ab7d202e26d8302c7
                                                • Opcode Fuzzy Hash: 4a0eef0986038a9280786b730bf4ed210299aa9c6d3afa4c388c8f318b6d1a2a
                                                • Instruction Fuzzy Hash: A0316B71A0021DEFDB21DF91DC49FBFBBB8EB08B05F140069EA11E6150D774AA05EB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (
                                                • API String ID: 0-3887548279
                                                • Opcode ID: 02710e0be0e0fea0cc6c1baa92faac2c31c4b85af378cc9c89c712276f41aad0
                                                • Instruction ID: 965400ff6a534922571e23c29e526d5b7fb17a42f8f46d6fe09e34c1f6370a4a
                                                • Opcode Fuzzy Hash: 02710e0be0e0fea0cc6c1baa92faac2c31c4b85af378cc9c89c712276f41aad0
                                                • Instruction Fuzzy Hash: 9D41DEB0D0024DEFDB21DF9AD884ADEBBF4BF08318F10952AE459BB290C77499459F50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: 3bcc3d08f6407fec29fe33e4565e6e73801b717fae71e3555aa24a709d66a1dd
                                                • Instruction ID: 340f65c68dfe669fb064bfd19a2caa0e2260e4a854a7204620f4b5b84986b082
                                                • Opcode Fuzzy Hash: 3bcc3d08f6407fec29fe33e4565e6e73801b717fae71e3555aa24a709d66a1dd
                                                • Instruction Fuzzy Hash: 3B21A2B1A002489FD720CF58CA58FEAB7F8EB19719F10546DE941BB281C7B59D069B50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: 9b6072e8db9b52ad2fc1aeb226510abda20412a8ab4115c9295973f951a764cb
                                                • Instruction ID: 20df90a571f831b3e8a71d77b623fc01c36c1b7e3f73ba2a268d00f1690e2ded
                                                • Opcode Fuzzy Hash: 9b6072e8db9b52ad2fc1aeb226510abda20412a8ab4115c9295973f951a764cb
                                                • Instruction Fuzzy Hash: FC015A3200060DEFCF22AF91C909BEA3766EB58349F549425B915B90A4D775CD61EF12
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 782a3ede2740dd29089142b353cf4284d2e75628cdcc4ddf797b637dcce6a399
                                                • Instruction ID: eee3f5e9cf2f78014220d6541c43b7d775943f39005cff97af7a8cbf786ffed4
                                                • Opcode Fuzzy Hash: 782a3ede2740dd29089142b353cf4284d2e75628cdcc4ddf797b637dcce6a399
                                                • Instruction Fuzzy Hash: 7BF1BD75A0069AEFCB24CF6AC8806EABBF1FF58304B14912AD845E7710E770E955CBD1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ba95c192e2beac5614b2a814bcd4ae5e30fd2a39cc11184773606c1d70cc5e17
                                                • Instruction ID: 06f5f389510bd983000f669d32cfb599dd54aaab3e28ade3dc275f1609afb267
                                                • Opcode Fuzzy Hash: ba95c192e2beac5614b2a814bcd4ae5e30fd2a39cc11184773606c1d70cc5e17
                                                • Instruction Fuzzy Hash: 5DD1CF71B002289BCB30AF14CC44BBAB7B8EB54718F54919AF749AB181D771DEC2DB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 611cbacc878a7469f2aa57295f881d49f427e32a1801f114c5f403bec126e820
                                                • Instruction ID: 1c2a188cd22f8a406a42ad360a81897b0f805548f6a5ad1b4b813df9e3d9e28e
                                                • Opcode Fuzzy Hash: 611cbacc878a7469f2aa57295f881d49f427e32a1801f114c5f403bec126e820
                                                • Instruction Fuzzy Hash: B2B1B234A003489FDF25CFA8C444BB9BBF1EF49318F189489D645BB392D775A946CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be6f3a7c8a13681a2f75826ba54214a5428f0bb03d393b6301da5f8742ff1631
                                                • Instruction ID: f4be24d4aff064cf095a8505e14d3dc10257710fe86d053435d99163d37b1503
                                                • Opcode Fuzzy Hash: be6f3a7c8a13681a2f75826ba54214a5428f0bb03d393b6301da5f8742ff1631
                                                • Instruction Fuzzy Hash: 61B169359022298FCF749F29CC986A9B7B1FF58744F1541DAE809B7260EB30AE85DF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6de7ed9ffb7b25ddbe83828258e076eaf09c1b09db60439635979a6a5d2e215f
                                                • Instruction ID: 4559808dad34124aed81bf4b083b9c9e72f3fed2b3fdfbbe4e76f1ae8638836b
                                                • Opcode Fuzzy Hash: 6de7ed9ffb7b25ddbe83828258e076eaf09c1b09db60439635979a6a5d2e215f
                                                • Instruction Fuzzy Hash: 44B14A75A021298FCF74EF29CC58AA9B7B5EF58744F544299D80DA7250EB309E81DF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3c5f79e32189d5dde0aa4195e3e96c80cfbe804ede7c381d6d84789cf3d1de1f
                                                • Instruction ID: 75791ac85b74c06bda18d9412c7b3b71d0beecb93dd2f826012370f4af1f1034
                                                • Opcode Fuzzy Hash: 3c5f79e32189d5dde0aa4195e3e96c80cfbe804ede7c381d6d84789cf3d1de1f
                                                • Instruction Fuzzy Hash: 3A919275A007499FDB25CFA4C8407B9BBF1EF89348F189099DA81BB352E3759942CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f935a5f885e942eb5ec0ec991a6a078699c5eb57994da04dd7209c1b7194761
                                                • Instruction ID: 91e19f82d248659dc49562db5edf8feac482eab29ade5f5675d5d7dd287253ec
                                                • Opcode Fuzzy Hash: 1f935a5f885e942eb5ec0ec991a6a078699c5eb57994da04dd7209c1b7194761
                                                • Instruction Fuzzy Hash: 00A14275608305DFCB14CF29C984AAABBE1FB88714F15946EF89997360D731E842CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e9fd31366e63961a094802440feb1079747782301c27a6ef41309d233703724
                                                • Instruction ID: f2516e6e6970c54bb0b7c4214c9177334da2c077f06c92952b7caea3ae45aae4
                                                • Opcode Fuzzy Hash: 8e9fd31366e63961a094802440feb1079747782301c27a6ef41309d233703724
                                                • Instruction Fuzzy Hash: 8971E772E046299FDB219F648C48B6A77B5EF44B10F1001A9E849EB3D0EB359E51FF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e729435487aff943b1fc43ea2385c65fa201159da1eca01167416b480c3b62de
                                                • Instruction ID: c81045756753f0ef811bc1602c7def686ade99a04a5642f16e449995bcf2a4f5
                                                • Opcode Fuzzy Hash: e729435487aff943b1fc43ea2385c65fa201159da1eca01167416b480c3b62de
                                                • Instruction Fuzzy Hash: 6C61DD71A087419BC724CF54C982FABB3E8AFC8758F04152CF985A7290DB72DD06CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9db1c348cb9e80e28bbf4b89f98f43593bb49b4d6524a90ba768f14e1154994d
                                                • Instruction ID: a2ba9daba5d9abcfe613bdf47160eb62547ce89cbef855b606b7ab78d96f0919
                                                • Opcode Fuzzy Hash: 9db1c348cb9e80e28bbf4b89f98f43593bb49b4d6524a90ba768f14e1154994d
                                                • Instruction Fuzzy Hash: FC81BFB5A11218DBCB21DF25CC4CBE6B7B4FB18308F2041A5E948AB292D731AA85CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 993eb562689ea3a1f98a49b9cf36e14b1be68afc1a36a618eb9c7a232bd6c7e6
                                                • Instruction ID: bebe2ccdd7022b0ebc35241a56132d43ebf568b597564599a5a256c7b2359d7c
                                                • Opcode Fuzzy Hash: 993eb562689ea3a1f98a49b9cf36e14b1be68afc1a36a618eb9c7a232bd6c7e6
                                                • Instruction Fuzzy Hash: C351BD31E0059DABDF21CB96CC84AFEB7B5AF8C314F155035E901BB2A0DB319D019BA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 573b5427b87069c5e2b418cabe157cceee069f63c0d81617d222cbbb2ddca980
                                                • Instruction ID: 23c4a2f0ee545bfe559eebf7e9c9b8a1f2d48ad3b19c65d4a8eed5647e198d15
                                                • Opcode Fuzzy Hash: 573b5427b87069c5e2b418cabe157cceee069f63c0d81617d222cbbb2ddca980
                                                • Instruction Fuzzy Hash: F251E7357001019BCB25DF58CA40FBBBBB6EF94708719946DE802AB611E732ED43C790
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f7f8fc769350ddee5b12908feba93b39ef34cd3c22456c96786ce68bd1cebd5c
                                                • Instruction ID: 63a503e9a28232d54675049a8907b96d2185799028b3a11bd135410cf8020d9d
                                                • Opcode Fuzzy Hash: f7f8fc769350ddee5b12908feba93b39ef34cd3c22456c96786ce68bd1cebd5c
                                                • Instruction Fuzzy Hash: E0515EB1B0022D9BDB20DF65CD84BAABBFDEF44305F1051B8A648E2241EB719E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3cbc2d4a76e68208c79400c3884598b74301eb6de05805aa72cf2ed852f65cc9
                                                • Instruction ID: 537c6d365c5c68bbbb4ad7f1e25d9dbff1d5776e1b3bcf3b09cebb83e13f0722
                                                • Opcode Fuzzy Hash: 3cbc2d4a76e68208c79400c3884598b74301eb6de05805aa72cf2ed852f65cc9
                                                • Instruction Fuzzy Hash: 13517D31A00609DFDB24CF58CB85FAAB7F1EB48314F29456DE955AB291CB31AD12CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 64524993d040e22602c2801a4a7ccfb7ec6d2d8ef7c92595748741692558898f
                                                • Instruction ID: 57dd6d0dd3ac15bcfc8162dc3739e210ae7307eb03ddba7d40b0365958f922f2
                                                • Opcode Fuzzy Hash: 64524993d040e22602c2801a4a7ccfb7ec6d2d8ef7c92595748741692558898f
                                                • Instruction Fuzzy Hash: 5E516D31A40208DFDB24CF58CA85FAAB7F1EF58714F25415DE985AB291CB71AD12CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 187bb99130694179ce0573c457b64edd6390a13cce38fc3dbd182fe2bf208aa8
                                                • Instruction ID: 555790ac7530d82cd0f2aa61b0406144ddbc2bd35fa6d6c6d038428ee2c9f9e7
                                                • Opcode Fuzzy Hash: 187bb99130694179ce0573c457b64edd6390a13cce38fc3dbd182fe2bf208aa8
                                                • Instruction Fuzzy Hash: 5151AE32600A48ABCB21AF65DE05FAB7BBAEF84704F10501DF902B7251DB72ED52DB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 51a49a5d4f3c95c9ca1308c9f49fcfe758debfafbf51e3b12e03339f67948907
                                                • Instruction ID: abaae081991b0816500ea7636dbf192f3d33c0ba52ec8752a74c29da5446c941
                                                • Opcode Fuzzy Hash: 51a49a5d4f3c95c9ca1308c9f49fcfe758debfafbf51e3b12e03339f67948907
                                                • Instruction Fuzzy Hash: 0D410531B0C6CCAADF36CE57CD09BAA7BA29B91718F295059E8437F2A0D731EC41D650
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b1c4537571883876e2d0e028e05e0ea5ecf19da32be1a58af3e7c787f216ab15
                                                • Instruction ID: ffff8a717e38e23269e2d9158ee34837e832c9d207e524f627a907af115435d8
                                                • Opcode Fuzzy Hash: b1c4537571883876e2d0e028e05e0ea5ecf19da32be1a58af3e7c787f216ab15
                                                • Instruction Fuzzy Hash: B651D032900615DFC721CF68C940B6ABBF4FF48704B1545A9E986EB760D332EE52DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a3bcf72773a7f3cbbf2a1ee9156cd3ee2f82e29b6723bc9c075db2d67f4b6924
                                                • Instruction ID: 955eb1261acdfad1239bd77add8f529e5a2677fba432267938193abeffa9138c
                                                • Opcode Fuzzy Hash: a3bcf72773a7f3cbbf2a1ee9156cd3ee2f82e29b6723bc9c075db2d67f4b6924
                                                • Instruction Fuzzy Hash: 44515B31A00209ABCB259FA4DE45FAF7BB9FF48B04F100029F511B7261DB36D912DB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26e4700b23f778384dec9e0cfaaffd46434913247387c41f0c2398d6579b6125
                                                • Instruction ID: 8c22d4bae225c81090b8f15793ae46ceb363fab5b708901b0385572078561e43
                                                • Opcode Fuzzy Hash: 26e4700b23f778384dec9e0cfaaffd46434913247387c41f0c2398d6579b6125
                                                • Instruction Fuzzy Hash: 9841F136640608AFD7259FA4DC09FAB7BB8EF48B11F104419F606EB2E0DA74DD41E764
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b5c2663446bc053aeb31838cafb146e245d1580616e0cdf70a15a8d5ddab7ead
                                                • Instruction ID: 289f71c17ae6fb4c869a68d056e237361ccc45b35290af23be4bca52c31e166a
                                                • Opcode Fuzzy Hash: b5c2663446bc053aeb31838cafb146e245d1580616e0cdf70a15a8d5ddab7ead
                                                • Instruction Fuzzy Hash: AD517E75604209CFCB24DF68C640EAAB7F1FF18745B10946EE841AB251E332ED92CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e480e6f2dbf1cff6b8559b980c025974dcbebac7749951dd60120e0c784c4dc7
                                                • Instruction ID: 132b417af5c6ef8dcff9d31d025bda0afac61ce3d87ae94bbcc97e7ffafdfdaf
                                                • Opcode Fuzzy Hash: e480e6f2dbf1cff6b8559b980c025974dcbebac7749951dd60120e0c784c4dc7
                                                • Instruction Fuzzy Hash: E641A1B2A40128ABDB309F14DC85FEBB7B9EB54744F1010A5EA85E7191EBB09EC1CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 827b202374b0d5633c32b11e25ead1ce07f4f504637bb5f6ca2f592482e94aba
                                                • Instruction ID: f21615ccbeb800f8f8af161e38755dc4ef5a40063ab0eca7db2453abff67b4d1
                                                • Opcode Fuzzy Hash: 827b202374b0d5633c32b11e25ead1ce07f4f504637bb5f6ca2f592482e94aba
                                                • Instruction Fuzzy Hash: AE419F72900119AFDB16DFA8CC88EEB7BB8EB48748F140025F905F7251DA399D11EBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 240779bbe3a8df5d83159e9705efb71f924d9dbdc6a34fb2eaa38363a450b8a2
                                                • Instruction ID: 67ce52a30ff35191e6c224889840b76046a0698fbe72878e3749d69a940aa710
                                                • Opcode Fuzzy Hash: 240779bbe3a8df5d83159e9705efb71f924d9dbdc6a34fb2eaa38363a450b8a2
                                                • Instruction Fuzzy Hash: 7941A876604202DFCB28CF28CA40B66B7F0FF98754B25546CE886DB650E731EC82CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9332a57b182ee1eac74a2f56091c8300538fc79aeece84b563154ad43b335670
                                                • Instruction ID: a5d137c7adf0ed45d3b7c45d781cc601dfeb64b11ebed4efcc91a5013194fd32
                                                • Opcode Fuzzy Hash: 9332a57b182ee1eac74a2f56091c8300538fc79aeece84b563154ad43b335670
                                                • Instruction Fuzzy Hash: 0F41F472B04701ABC310EE14DC45E27B794EBC0B20F10892DB959EB3C1EB74E905FAA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9ad850444731b57266133714a0bd9451e04e3159038cc765537ccd2a25f1e5d1
                                                • Instruction ID: 7d10292b0847391b0ae06a981bb75ad3d07159cbace555c1814a37abc7e447ff
                                                • Opcode Fuzzy Hash: 9ad850444731b57266133714a0bd9451e04e3159038cc765537ccd2a25f1e5d1
                                                • Instruction Fuzzy Hash: 9A41D031A00208ABDB209F68DC09FBAB7B8EF58B15F044519FA52FB1E0DB74D945DB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bba72316a848bc2280a5ec5471091f8b958c93ecf0c9de30899e26eab76d775e
                                                • Instruction ID: c103c4015364ab1727a7651a8637a37955a006f568b44c1e5e877887d8d34963
                                                • Opcode Fuzzy Hash: bba72316a848bc2280a5ec5471091f8b958c93ecf0c9de30899e26eab76d775e
                                                • Instruction Fuzzy Hash: D3312771B04B15ABDB209A58CC88B6B7769DB68B10F10046AF9859B3C1DAF5DE01BED0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f52808ba31c040c3f743c67839e451c0229d2f6117677b0f4f1c53287c1f563c
                                                • Instruction ID: a111571ca66c1a010c4e1bd0cdbf167faec870fd4cac2907c6c6f5605817351a
                                                • Opcode Fuzzy Hash: f52808ba31c040c3f743c67839e451c0229d2f6117677b0f4f1c53287c1f563c
                                                • Instruction Fuzzy Hash: AF413E35911119AFCB21DFA4D848AEF7BB8EF08304F114866E902E7260D778DA51DB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: df84ae52228fb880a0484099edc80110ff09e30231797f8924f82cb62eccbba3
                                                • Instruction ID: d1576b49901872922dd3b60c079b957d98bb93a5bac77d959fd4807c823e87a8
                                                • Opcode Fuzzy Hash: df84ae52228fb880a0484099edc80110ff09e30231797f8924f82cb62eccbba3
                                                • Instruction Fuzzy Hash: EA419A71501605EFD7329F68CA08AAABBB9FF04B54F004469F586EB760DB30E841DB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e605c83183076293846f8afef1c23f107ca4dc85d201143327ea3d05983860f
                                                • Instruction ID: d7156b5e699b1ba17150f58be8d95e2aae4de5861cdfcf367f79c2a447c64bc6
                                                • Opcode Fuzzy Hash: 8e605c83183076293846f8afef1c23f107ca4dc85d201143327ea3d05983860f
                                                • Instruction Fuzzy Hash: 02415271A0060AFFDB14CF99CC45ABABBB9FF48310F144229E654E2691D770B951CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e385f4dc4f0540929a0989f451c7d31df6bdad198895d03fb17bc427c267d76
                                                • Instruction ID: 677edd90d2b8f1e42abf9b0d99b63c25717c6246788db6837ef08b7953f0602c
                                                • Opcode Fuzzy Hash: 6e385f4dc4f0540929a0989f451c7d31df6bdad198895d03fb17bc427c267d76
                                                • Instruction Fuzzy Hash: A031D1B3A00124BACB249A5D8841FBEB7A8EF94751F15416AF901EB3D0D639CE41B760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c8d190f6b007feaf6495e9963f3fc5aba95b3965cb88671aef47b54529475888
                                                • Instruction ID: 0f7c10f9aa9d0b13735558016b668e50de528ece90b3e0bbfddb419fa136956b
                                                • Opcode Fuzzy Hash: c8d190f6b007feaf6495e9963f3fc5aba95b3965cb88671aef47b54529475888
                                                • Instruction Fuzzy Hash: B631DE76900158DFDB22CFE4CD58FADBBB5EB49751F10002AF901AB294DB769D02EB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8c01fc813c40fb8b4be46316396e775bab15a0901b42fce27de2500c07a81a86
                                                • Instruction ID: a29ec12c71dcf631565e2016fd52536aa683a57dee7104bbd179d2a0b2de177f
                                                • Opcode Fuzzy Hash: 8c01fc813c40fb8b4be46316396e775bab15a0901b42fce27de2500c07a81a86
                                                • Instruction Fuzzy Hash: D4213B32B04611A7DB2166798C49E7BBA66EB44750F110125FC55EB3C2EEA0DD01B690
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 579bb60a9c7934874e4beb4300f40956f1f886b42ad4a5d107d57c2471d20858
                                                • Instruction ID: 3b1bdb72fb37bc8702a7d3c1d9c9dec29fe4096aa2c22ae56eec6305cc52677a
                                                • Opcode Fuzzy Hash: 579bb60a9c7934874e4beb4300f40956f1f886b42ad4a5d107d57c2471d20858
                                                • Instruction Fuzzy Hash: EA31E93B300514EFCB25AF64DC58BFB776DEB88704B144469ED03DA650DA71AD12E690
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 74d9fff708de326c2286037b85b7383f381df37db0b744cb0ae452817fcd862a
                                                • Instruction ID: 50b21384f4c23a6b4da1df2ad9281b158ef4f1e4ccfc7f31510747d43d5ade92
                                                • Opcode Fuzzy Hash: 74d9fff708de326c2286037b85b7383f381df37db0b744cb0ae452817fcd862a
                                                • Instruction Fuzzy Hash: C831A072E0064DABDB15DF95C881AAEBBBAFF44358F104069F905B7281D770AE15CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f64f612c01ef50b27fe180ce069453c7ebf59b5c9f15eb332a4ae9b1f46b4be
                                                • Instruction ID: afd3e069d55864941d08d80d23937963eed172934ae7bccb9305769020bd409a
                                                • Opcode Fuzzy Hash: 1f64f612c01ef50b27fe180ce069453c7ebf59b5c9f15eb332a4ae9b1f46b4be
                                                • Instruction Fuzzy Hash: 0E315E76700648AFCB14DF9ACC44EAEBBB9EF88744F104069E916E7290D770AD51DB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bcfed038d372b6ac5bf0599980e367d08839f0d115a9832b73f47be678231dc8
                                                • Instruction ID: 13c3b2d7911e1fa5a3b0817e1d377131890de91cb8ef4e0320e6bfbda1af1b05
                                                • Opcode Fuzzy Hash: bcfed038d372b6ac5bf0599980e367d08839f0d115a9832b73f47be678231dc8
                                                • Instruction Fuzzy Hash: 5621C131E00625AFCB309FA9DC55AAEB774EF44B31F148269F615A72E0DB704D91ABC0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 46eaa4b552b743f268313ab5938c2d7e19d44bff8f7407793558138096505b09
                                                • Instruction ID: 5e8ebbb149ad3b7ddaa07a027e95ab73f5f381df043660edfa9a5ffa2792f5dd
                                                • Opcode Fuzzy Hash: 46eaa4b552b743f268313ab5938c2d7e19d44bff8f7407793558138096505b09
                                                • Instruction Fuzzy Hash: D521D332E00624ABCB209FA8DC55AAEB774FF44B31F158269F415A72E0DB704D91AB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 15f56b5495e786fae9c2fbdea3486675ca36f5054eb684bbaa5a1f1bce8de3df
                                                • Instruction ID: 8e2d12b0a2f7c60beae6bc10c33c92da68953f497c915ffd4d2500afa8765bc9
                                                • Opcode Fuzzy Hash: 15f56b5495e786fae9c2fbdea3486675ca36f5054eb684bbaa5a1f1bce8de3df
                                                • Instruction Fuzzy Hash: A22183B594022DABDB21DBA19D49BFF7FBCEF02718F101256E941B10D2DB709A41DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5fc3aec62e5e29ab1783b958839e91cc09dbb3e323278841aa0a283188dca891
                                                • Instruction ID: 7e588dd5ba87c481f4d7335eabf41fd4c640b4fed565a7845022090be9fba589
                                                • Opcode Fuzzy Hash: 5fc3aec62e5e29ab1783b958839e91cc09dbb3e323278841aa0a283188dca891
                                                • Instruction Fuzzy Hash: 1721A732900518BFC7229F99DD08E9ABF79EB8AB60F110054F5059B270C6319E22FBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1a52c99d367a0d5c86a02d8efbf94ae24e78bb726a236a67b65c6f42088624bf
                                                • Instruction ID: f5a0fabfe2555813a89dafdb95fdbeb183980af000b4005ae87525f3dbd4ba5e
                                                • Opcode Fuzzy Hash: 1a52c99d367a0d5c86a02d8efbf94ae24e78bb726a236a67b65c6f42088624bf
                                                • Instruction Fuzzy Hash: 5131A272902528EFCB359FA5DD9CBDABBB9BB04B05F5400E4E409A6160CB349E85DF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e843c02d959bf45c30ea5e0f04b5f73bbfe75b7f9ac498fab067d763e38771ca
                                                • Instruction ID: b652ac85cc264a2d7e2b272dc978d26ffc9834fa2f520a1de882f032e00b15e5
                                                • Opcode Fuzzy Hash: e843c02d959bf45c30ea5e0f04b5f73bbfe75b7f9ac498fab067d763e38771ca
                                                • Instruction Fuzzy Hash: 2D21E432A00204EBC721DF98CE85F5EBBB9EB88B44F15106CF940B7351C675AE12DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 823f4701cffebd33de715cb786aab9246bb90b78d5ae10c106ea1646726fbb7a
                                                • Instruction ID: cd8fe66153f33f3c5c84c5fe16cb8df55b54d75ff8f22e6ed0de6a78e4cec112
                                                • Opcode Fuzzy Hash: 823f4701cffebd33de715cb786aab9246bb90b78d5ae10c106ea1646726fbb7a
                                                • Instruction Fuzzy Hash: 2711BE73240508FFD721ABA5CC49FAB7BBCEB18794F100465F602E60A1DA259D11EBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 225aac9b1fb7164e2df5bfca80c3edc627896be14b77b0a4e227ac6b17f18dbb
                                                • Instruction ID: abf756aa061a7f0f9dce8fa43ee522b6858af278c3c72a3b964e42981facf1be
                                                • Opcode Fuzzy Hash: 225aac9b1fb7164e2df5bfca80c3edc627896be14b77b0a4e227ac6b17f18dbb
                                                • Instruction Fuzzy Hash: 0421C57962110CDFC315DF29CAD8EAABBB9FB48308F314279E5459B611D372AD41CB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 556ba8f5deba4ef137310782fccef20a776ad171e0c99962263a11b79fb079f9
                                                • Instruction ID: 4f948332328b8bcbaf449ed30ef798504701801fddfe00d1dc00de2fdead46a9
                                                • Opcode Fuzzy Hash: 556ba8f5deba4ef137310782fccef20a776ad171e0c99962263a11b79fb079f9
                                                • Instruction Fuzzy Hash: CC21D535A00618ABD720DF54DC8DFEFBBB4EB48706F104115F901AA280CB759905DBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0ff9f1ec85c290323a82075d656e56eec7d4a32baf7705d34e363c4133e95795
                                                • Instruction ID: 6bbe98b5eb40a9a2a7dabf348f020f1f4191e9ec5c25de9923c174132c4bd9f0
                                                • Opcode Fuzzy Hash: 0ff9f1ec85c290323a82075d656e56eec7d4a32baf7705d34e363c4133e95795
                                                • Instruction Fuzzy Hash: 5421A2B2A00165EFC728CF48C694EA9BBF8EF48710B15406EF905A7350D731DD42CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f19cc69f85ecf1cbdd782e94e318edc211c08bb19cfcfdaf4d70c4c42a5bd065
                                                • Instruction ID: feb7ac456f6df58f07fc62694ca564998d6e34462d37801679d4f9d31ca920a5
                                                • Opcode Fuzzy Hash: f19cc69f85ecf1cbdd782e94e318edc211c08bb19cfcfdaf4d70c4c42a5bd065
                                                • Instruction Fuzzy Hash: 7E11E535200604FFD3358B44DC98FABBBB9EB89710F100068FA06D7390CA74AD11EA90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 068e859692110fcdd8021f8e581c7788fb6661e46e1480350eb7b169e1a13f7c
                                                • Instruction ID: 8775360a172503cb7327c7c718a05ca60eb307215cf040f8e0e351d68338d17c
                                                • Opcode Fuzzy Hash: 068e859692110fcdd8021f8e581c7788fb6661e46e1480350eb7b169e1a13f7c
                                                • Instruction Fuzzy Hash: 42F02232104649EBC7219F55CC08E9B77B8EF89304F01442AF502E7620E238E815EF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fda5fdd7f41af9976f2844516dddbbc230ab2cd55dd248bf656ebe6f53fff660
                                                • Instruction ID: 87e55cbccd1ad54d063ca3b37253b0bc03e7c5e2dd9ef217b40a5c769c6140b9
                                                • Opcode Fuzzy Hash: fda5fdd7f41af9976f2844516dddbbc230ab2cd55dd248bf656ebe6f53fff660
                                                • Instruction Fuzzy Hash: 7701E872140940EFC7369F06DE08E43BFB9FB95B11B0144A9F00683A71C234A852DB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a8d5367f6c529b64c2e70204f2dd2e498d28100954c3fa9a7bb695bb6ffdb037
                                                • Instruction ID: 27132c0b69eb442f842d19d60e32975fe763cc9e49e567d9191c01bc38cd8b57
                                                • Opcode Fuzzy Hash: a8d5367f6c529b64c2e70204f2dd2e498d28100954c3fa9a7bb695bb6ffdb037
                                                • Instruction Fuzzy Hash: E2F03732201A44EBC732AF04CE49F56BBA5FB04B04F442428F542529F1C735B892EA40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7f4f32c4c3a931f2c09e3672aae5ac25dc2d53b006c46a8a21c028fe51f45a2d
                                                • Instruction ID: 273a4e9f91fa856959a5cdc523469c9e405edb9aa5284e6d7fe215ce2fa8887e
                                                • Opcode Fuzzy Hash: 7f4f32c4c3a931f2c09e3672aae5ac25dc2d53b006c46a8a21c028fe51f45a2d
                                                • Instruction Fuzzy Hash: 26F08533140A10ABCB325F00DA04F127BB4FB80B28F260858E515AB6A1C332AD12DAA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 01a8ae24a9d78399fce248b5858788c7eb82c49ef467e288a5260f0fded8eee5
                                                • Instruction ID: 086e169be6c38675200e2d15a700a58809d4b9bf979026b034f5c39f76ac9b8a
                                                • Opcode Fuzzy Hash: 01a8ae24a9d78399fce248b5858788c7eb82c49ef467e288a5260f0fded8eee5
                                                • Instruction Fuzzy Hash: 24F01532A414689FDF259F01CD4CE99BB39FB04B44F0901D8A809A3630CB30AD91DE90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5d5d93c5cc06752820ba0d755bea624b0f86b284ac508247c4ff353e8732630c
                                                • Instruction ID: 97e35b5888dab91e96d5b282b47b7bfb6eb441ef52b9b5d0800ec17290451244
                                                • Opcode Fuzzy Hash: 5d5d93c5cc06752820ba0d755bea624b0f86b284ac508247c4ff353e8732630c
                                                • Instruction Fuzzy Hash: 13E01AB6640049DFDF29AF15CE48F66B779FB14B44F0400D8A409E3661C730ED51DE60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 642c84cf2179c297043648df6f0a499e7256ef14fbf73a48e65573ba089e5b70
                                                • Instruction ID: f3a21a60b7d2f92cb59fc4c1c4d5f8a97ea3f654eec3dbd9755a8a9282d08852
                                                • Opcode Fuzzy Hash: 642c84cf2179c297043648df6f0a499e7256ef14fbf73a48e65573ba089e5b70
                                                • Instruction Fuzzy Hash: 47E0E632550448DFCF159F55DE44F1A7BB9FB48B44F150068F405D3561C625DC51DA54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 998bad9963e5c3a9c40f29950ed32f26b5a6bb1c0b1a49625448dd6695de6c70
                                                • Instruction ID: 3d4055d6f026fcf7f5b0144957d5658e04936563fb4ebdb48f735343e9308525
                                                • Opcode Fuzzy Hash: 998bad9963e5c3a9c40f29950ed32f26b5a6bb1c0b1a49625448dd6695de6c70
                                                • Instruction Fuzzy Hash: 8AD022320C0608EBCB228F00CD09F903F68E750B50F004020B608064B0C771E8A1DA84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6c17245ee4bed2f0f191b1787230a7dd8e60f250e97eceb3f18b8e231fb8fd5a
                                                • Instruction ID: c6c57b4cc696daef7fb10b19af0f2453cf7cad6a47f5a04a575d3dc35600c70d
                                                • Opcode Fuzzy Hash: 6c17245ee4bed2f0f191b1787230a7dd8e60f250e97eceb3f18b8e231fb8fd5a
                                                • Instruction Fuzzy Hash: 83D0C9B1C0159CDFCF329F47D944B6ABB79FB14B09F045064E5107A1B083349C41CE98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6d126c66881d4621ef25e53b5cde0bf831e0f4896e003c5f9e2357501fbccd07
                                                • Instruction ID: 6e511b830f2e61f855322183cf0b01dee4fa2247f74d141a381a8f2ca0bdc781
                                                • Opcode Fuzzy Hash: 6d126c66881d4621ef25e53b5cde0bf831e0f4896e003c5f9e2357501fbccd07
                                                • Instruction Fuzzy Hash: 47C012712619448ECF117B30C914A2133F4E740746F0844B5A10DD50B1DB24D882E501
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 12ceb215b933e79de91ce475ab302682a366126b9f27c0dd0b97bae5cb3b37ca
                                                • Instruction ID: 79ea797fafb1ba87a36889d4b90fb3f2941d466e45a38f3669e847e8971f9ea1
                                                • Opcode Fuzzy Hash: 12ceb215b933e79de91ce475ab302682a366126b9f27c0dd0b97bae5cb3b37ca
                                                • Instruction Fuzzy Hash: E9D02239D81694C7CF21EF84880079EB230AF40B20F254244E4113B2C2C33C2B00EF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d2f78b53bd72470c99e2d8b0e04cfd6c5cf130b25a9a126760607f11178204a8
                                                • Instruction ID: fb86f976b9ffa563938536ff8fc16aecd2a8161ea66638f509482d1420eda1a6
                                                • Opcode Fuzzy Hash: d2f78b53bd72470c99e2d8b0e04cfd6c5cf130b25a9a126760607f11178204a8
                                                • Instruction Fuzzy Hash: 95B01232190440EFDF269F00CE0AF103B34F700F00F040094B101854F1C264BC11DA14
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.647099501.0000000000EB4000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EB4000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_eb4000_loaddll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0Olt$PNlt$pMlt$Mlt
                                                • API String ID: 0-2831465515
                                                • Opcode ID: 5e2f157e74fc7c007fb962a20543651832ba6adb1d8028102cdb044d3c790f1e
                                                • Instruction ID: 5261f667352c9d8b2d2a37690528ee1f370c406207882a5c2ec2f027cba119cf
                                                • Opcode Fuzzy Hash: 5e2f157e74fc7c007fb962a20543651832ba6adb1d8028102cdb044d3c790f1e
                                                • Instruction Fuzzy Hash: BA316F72A00619EB8B11DF95D941EEFB7B9FF48344F20902AF911F3244D631EA42DBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:6.5%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:127
                                                Total number of Limit Nodes:7
                                                execution_graph 9570 6ac073e0 9571 6ac0740c 9570->9571 9572 6ac0741e 9570->9572 9572->9571 9573 6ab59b20 2 API calls 9572->9573 9574 6ac07462 9573->9574 9575 6ab59a7c 2 API calls 9574->9575 9575->9571 9547 6ab608b4 9548 6ab608d0 9547->9548 9550 6ab60933 9548->9550 9551 6ab60678 9548->9551 9552 6ab60680 9551->9552 9553 6ab60689 9552->9553 9555 6ab60154 9552->9555 9553->9550 9556 6ab6015f 9555->9556 9557 6ab59728 2 API calls 9556->9557 9558 6ab60166 9557->9558 9558->9553 9559 6ac1f2f2 9560 6ac1f2fb 9559->9560 9564 6ac1f1cc 9559->9564 9566 6ab59b90 9560->9566 9562 6ac1f339 9563 6ab59a7c 2 API calls 9563->9564 9564->9562 9564->9563 9565 6ab59b20 2 API calls 9564->9565 9565->9564 9567 6ab59b9c 9566->9567 9568 6ab59b20 2 API calls 9567->9568 9569 6ab59baa 9568->9569 9569->9564 9576 6ac1f3b6 9577 6ab59a7c 2 API calls 9576->9577 9578 6ac1f3cd 9577->9578 9579 6ab5eb7c GetThreadUILanguage 9580 6ab5ebf1 9579->9580 9581 6ab5eb98 9579->9581 9583 6ab5eb38 2 API calls 9580->9583 9592 6ab5eb38 GetThreadPreferredUILanguages 9581->9592 9587 6ab5ebf9 9583->9587 9585 6ab5ec40 SetThreadPreferredUILanguages 9588 6ab5eb38 2 API calls 9585->9588 9587->9585 9591 6ab5ec81 9587->9591 9589 6ab5ec56 9588->9589 9590 6ab5ec71 SetThreadPreferredUILanguages 9589->9590 9589->9591 9590->9591 9593 6ab5eb72 SetThreadPreferredUILanguages 9592->9593 9594 6ab5eb59 9592->9594 9593->9580 9595 6ab5eb62 GetThreadPreferredUILanguages 9594->9595 9595->9593 9442 6ac776ec 9444 6ac77701 9442->9444 9443 6ac77744 9444->9443 9446 6ab80974 9444->9446 9447 6ab8097d 9446->9447 9448 6ab80982 9446->9448 9450 6ab80924 9447->9450 9448->9443 9455 6ab597f0 9450->9455 9452 6ab80934 9459 6ab59a7c 9452->9459 9454 6ab80967 9456 6ab597ff 9455->9456 9463 6ab59b20 9456->9463 9458 6ab5980d 9458->9452 9460 6ab59a88 9459->9460 9461 6ab59b20 2 API calls 9460->9461 9462 6ab59a96 9461->9462 9462->9454 9464 6ab59b3c 9463->9464 9466 6ab59b41 9463->9466 9467 6ab59728 9464->9467 9466->9458 9468 6ab59731 9467->9468 9470 6ab59736 9467->9470 9471 6ab59608 9468->9471 9470->9466 9472 6ab59622 9471->9472 9473 6ab59630 GetLogicalProcessorInformation 9472->9473 9476 6ab5967c 9472->9476 9474 6ab59643 9473->9474 9473->9476 9475 6ab59655 GetLogicalProcessorInformation 9474->9475 9474->9476 9475->9476 9476->9470 9477 6af4f0f8 9478 6af4f110 9477->9478 9481 6ad4f470 9478->9481 9482 6ad4f49c 9481->9482 9487 6ad50354 9482->9487 9484 6ad4f571 9486 6ad4f4a4 9486->9484 9491 6ad4f1f8 9486->9491 9489 6ad50368 9487->9489 9488 6ad503eb 9488->9486 9489->9488 9490 6ad503e1 ProcessIdToSessionId 9489->9490 9490->9488 9496 6ad4f0cc 9491->9496 9493 6ad4f207 9494 6ad4f214 9493->9494 9500 6ad500f4 9493->9500 9494->9486 9497 6ad4f0e5 9496->9497 9499 6ad4f180 9497->9499 9506 6ad4ef64 9497->9506 9499->9493 9501 6ad5011e 9500->9501 9502 6ad50910 2 API calls 9501->9502 9503 6ad5013d 9501->9503 9502->9503 9505 6ad5022f 9503->9505 9528 6ac1f0dc 9503->9528 9507 6ad4ef8f 9506->9507 9508 6ad4ef78 9506->9508 9507->9499 9508->9507 9510 6ad50910 9508->9510 9511 6ad50926 9510->9511 9515 6ad50936 9510->9515 9516 6ad5089c 9511->9516 9513 6ad5092d 9520 6ad4cbf4 9513->9520 9515->9507 9517 6ad508aa 9516->9517 9519 6ad508dc 9516->9519 9517->9519 9524 6ad506a8 9517->9524 9519->9513 9522 6ad4cc00 9520->9522 9521 6ad4cc69 9521->9515 9522->9521 9523 6ad4f1f8 2 API calls 9522->9523 9523->9522 9525 6ad506b8 9524->9525 9526 6ad506e4 9525->9526 9527 6ad50910 2 API calls 9525->9527 9526->9519 9527->9526 9529 6ac1f0f9 9528->9529 9535 6ac1f0f0 9528->9535 9539 6ac1f98c 9529->9539 9531 6ac1f0fe 9532 6ac1f98c 2 API calls 9531->9532 9533 6ac1f110 9531->9533 9532->9533 9534 6ab59b20 2 API calls 9533->9534 9537 6ac1f164 9534->9537 9535->9505 9536 6ab59a7c 2 API calls 9536->9537 9537->9535 9537->9536 9538 6ab59b20 2 API calls 9537->9538 9538->9537 9540 6ac1f992 9539->9540 9542 6ac1f9b5 9540->9542 9543 6ac37ba8 9540->9543 9542->9531 9546 6ac37bbc 9543->9546 9544 6ab59a7c 2 API calls 9545 6ac37c61 9544->9545 9546->9544

                                                Control-flow Graph

                                                APIs
                                                • ProcessIdToSessionId.KERNEL32(00000000,?,00000000,6AD5040A,?,?,00001000,?,?,?,?,?,?,?,6AD4F4A4,00000000), ref: 6AD503E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.1014696634.000000006AB51000.00000040.00000001.01000000.00000003.sdmp, Offset: 6AB50000, based on PE: true
                                                • Associated: 00000003.00000002.1014672796.000000006AB50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF59000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF7F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFE7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFFD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B008000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B010000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B044000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B053000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B05C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B061000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0E1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B137000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B140000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B145000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B20D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B216000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B21B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B229000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B237000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B27A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B300000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B309000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B30E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B382000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B39A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3A1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B443000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B472000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B47E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B485000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B527000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B557000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B562000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B56A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B59E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B60B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B63B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B647000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B64E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B682000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B691000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B71F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B72B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B732000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B767000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B775000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B77E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B783000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B791000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B7D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B803000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B80F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B816000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B84B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B854000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B859000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B868000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B871000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B875000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8B8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8F3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B92F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B93E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B947000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B94C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B959000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B99D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9CC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA2B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA30000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA81000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BB94000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC06000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC49000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC78000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC8C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCCF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD2D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD52000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD68000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD70000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDA4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDC1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDCE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE12000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE41000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE54000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE88000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEB2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEF6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF31000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF6D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF76000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF8A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF93000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BFDA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C00A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C015000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C01D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C051000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C060000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C069000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C07B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C101000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C135000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C144000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C14D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C15F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1D2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C21A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C223000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C228000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C236000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C244000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C287000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2CA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C30D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C316000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C324000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C328000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C36B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C372000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C39B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C40C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C450000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C47F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C48B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C492000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C534000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C558000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C561000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C564000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C56F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C577000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5AB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C618000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C648000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C654000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C65B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C68F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C69E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C721000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C72C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C738000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C73F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C78B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C790000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C79E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C7E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C8F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C900000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C907000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C93C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C945000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C94A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C958000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C966000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9A9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9D9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9EC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA20000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA2F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA46000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA4A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA8D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CCD3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026102509.000000006CCD4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026124825.000000006CCE8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026140192.000000006CCE9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026156187.000000006CCF0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026173591.000000006CCF4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026389992.000000006CD84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026453303.000000006CDE3000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026479348.000000006CDEB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026502713.000000006CDED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026628925.000000006CE9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026657763.000000006CE9C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026681108.000000006CE9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_6ab50000_rundll32.jbxd
                                                Similarity
                                                • API ID: ProcessSession
                                                • String ID: GlassSessionId$SYSTEM\CurrentControlSet\Control\Terminal Server
                                                • API String ID: 3779259828-152818403
                                                • Opcode ID: 320d0e3c7c5a6e47cefd9a03d8ca3b360b5a42baa9992333867bd73f1b8a946a
                                                • Instruction ID: 94cb12bcd0c5065c8ea35f814ea904fda31a27b0c83c574b412350b19fcb3bcd
                                                • Opcode Fuzzy Hash: 320d0e3c7c5a6e47cefd9a03d8ca3b360b5a42baa9992333867bd73f1b8a946a
                                                • Instruction Fuzzy Hash: 1D11B470A04158AFDF00CBA4D8449AEB7F9EB4938CFA344A0E9509B352DF769D10D750
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.1026389992.000000006CD84000.00000040.00000001.01000000.00000003.sdmp, Offset: 6AB50000, based on PE: true
                                                • Associated: 00000003.00000002.1014672796.000000006AB50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AB51000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF59000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF7F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFE7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFFD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B008000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B010000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B044000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B053000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B05C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B061000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0E1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B137000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B140000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B145000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B20D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B216000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B21B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B229000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B237000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B27A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B300000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B309000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B30E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B382000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B39A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3A1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B443000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B472000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B47E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B485000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B527000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B557000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B562000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B56A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B59E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B60B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B63B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B647000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B64E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B682000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B691000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B71F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B72B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B732000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B767000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B775000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B77E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B783000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B791000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B7D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B803000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B80F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B816000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B84B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B854000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B859000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B868000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B871000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B875000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8B8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8F3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B92F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B93E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B947000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B94C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B959000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B99D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9CC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA2B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA30000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA81000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BB94000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC06000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC49000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC78000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC8C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCCF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD2D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD52000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD68000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD70000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDA4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDC1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDCE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE12000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE41000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE54000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE88000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEB2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEF6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF31000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF6D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF76000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF8A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF93000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BFDA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C00A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C015000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C01D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C051000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C060000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C069000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C07B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C101000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C135000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C144000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C14D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C15F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1D2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C21A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C223000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C228000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C236000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C244000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C287000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2CA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C30D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C316000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C324000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C328000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C36B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C372000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C39B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C40C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C450000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C47F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C48B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C492000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C534000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C558000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C561000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C564000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C56F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C577000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5AB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C618000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C648000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C654000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C65B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C68F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C69E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C721000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C72C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C738000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C73F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C78B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C790000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C79E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C7E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C8F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C900000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C907000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C93C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C945000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C94A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C958000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C966000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9A9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9D9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9EC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA20000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA2F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA46000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA4A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA8D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CCD3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026102509.000000006CCD4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026124825.000000006CCE8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026140192.000000006CCE9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026156187.000000006CCF0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026173591.000000006CCF4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026453303.000000006CDE3000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026479348.000000006CDEB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026502713.000000006CDED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026628925.000000006CE9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026657763.000000006CE9C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026681108.000000006CE9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_6ab50000_rundll32.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ^r9
                                                • API String ID: 0-3881384153
                                                • Opcode ID: 954d2912230610f6b241f137454549ffcd912737bcbf3bffc0044943c1e95e8a
                                                • Instruction ID: 61673dbe09114a3532a7bb9c8d81aff9c46da4cb102a19568a940568a593ac86
                                                • Opcode Fuzzy Hash: 954d2912230610f6b241f137454549ffcd912737bcbf3bffc0044943c1e95e8a
                                                • Instruction Fuzzy Hash: 88416A69C4D245FEC7139F2985412DABBF0BB47314F6708CAD0D84BE3AE224790A9793
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 6AB59636
                                                • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,6AB596BC,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 6AB5966E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.1014696634.000000006AB51000.00000040.00000001.01000000.00000003.sdmp, Offset: 6AB50000, based on PE: true
                                                • Associated: 00000003.00000002.1014672796.000000006AB50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF59000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF7F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFE7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFFD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B008000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B010000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B044000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B053000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B05C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B061000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0E1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B137000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B140000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B145000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B20D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B216000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B21B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B229000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B237000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B27A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B300000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B309000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B30E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B382000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B39A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3A1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B443000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B472000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B47E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B485000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B527000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B557000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B562000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B56A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B59E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B60B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B63B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B647000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B64E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B682000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B691000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B71F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B72B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B732000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B767000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B775000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B77E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B783000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B791000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B7D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B803000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B80F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B816000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B84B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B854000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B859000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B868000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B871000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B875000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8B8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8F3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B92F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B93E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B947000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B94C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B959000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B99D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9CC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA2B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA30000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA81000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BB94000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC06000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC49000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC78000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC8C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCCF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD2D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD52000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD68000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD70000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDA4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDC1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDCE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE12000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE41000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE54000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE88000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEB2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEF6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF31000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF6D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF76000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF8A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF93000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BFDA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C00A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C015000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C01D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C051000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C060000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C069000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C07B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C101000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C135000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C144000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C14D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C15F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1D2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C21A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C223000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C228000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C236000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C244000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C287000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2CA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C30D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C316000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C324000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C328000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C36B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C372000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C39B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C40C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C450000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C47F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C48B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C492000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C534000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C558000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C561000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C564000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C56F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C577000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5AB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C618000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C648000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C654000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C65B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C68F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C69E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C721000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C72C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C738000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C73F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C78B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C790000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C79E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C7E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C8F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C900000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C907000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C93C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C945000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C94A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C958000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C966000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9A9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9D9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9EC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA20000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA2F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA46000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA4A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA8D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CCD3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026102509.000000006CCD4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026124825.000000006CCE8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026140192.000000006CCE9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026156187.000000006CCF0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026173591.000000006CCF4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026389992.000000006CD84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026453303.000000006CDE3000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026479348.000000006CDEB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026502713.000000006CDED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026628925.000000006CE9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026657763.000000006CE9C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026681108.000000006CE9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_6ab50000_rundll32.jbxd
                                                Similarity
                                                • API ID: InformationLogicalProcessor
                                                • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                                                • API String ID: 1773637529-79381301
                                                • Opcode ID: de67353fb75fce00278bbb1c2aff2853eaf5851fa322d571a8d0a5d4bc7bc6ac
                                                • Instruction ID: d735c18054f5aefcc282dd5ee0384b6f03e0e71f909facf53d3ea3ff429a7a53
                                                • Opcode Fuzzy Hash: de67353fb75fce00278bbb1c2aff2853eaf5851fa322d571a8d0a5d4bc7bc6ac
                                                • Instruction Fuzzy Hash: 1B11D3B0D05288AEDB00DFA4C818B9DB7F8EF04314F118595E824D3651DF788AA8EF21
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetThreadUILanguage.KERNEL32(?,00000000), ref: 6AB5EB8D
                                                • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 6AB5EBEB
                                                • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 6AB5EC48
                                                • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 6AB5EC7B
                                                  • Part of subcall function 6AB5EB38: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,6AB5EBF9), ref: 6AB5EB4F
                                                  • Part of subcall function 6AB5EB38: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,6AB5EBF9), ref: 6AB5EB6C
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.1014696634.000000006AB51000.00000040.00000001.01000000.00000003.sdmp, Offset: 6AB50000, based on PE: true
                                                • Associated: 00000003.00000002.1014672796.000000006AB50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF59000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AF7F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFE7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006AFFD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B008000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B010000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B044000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B053000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B05C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B061000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0E1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B0F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B137000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B140000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B145000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B1D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B20D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B216000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B21B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B229000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B237000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B27A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B2F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B300000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B309000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B30E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B382000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B38E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B39A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3A1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B443000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B472000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B47E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B485000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B4E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B527000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B557000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B562000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B56A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B59E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B60B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B63B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B647000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B64E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B682000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B691000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B69F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B6F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B71F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B72B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B732000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B767000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B775000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B77E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B783000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B791000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B7D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B803000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B80F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B816000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B84B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B854000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B859000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B868000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B871000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B875000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8B8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8F3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B8FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B92F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B93E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B947000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B94C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B959000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B99D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9CC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9D8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006B9DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA22000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA2B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA30000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BA81000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BB94000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BBF8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC06000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC49000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC78000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BC8C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCC9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCCF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BCEA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD2D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD52000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD68000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BD70000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDA4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDC1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BDCE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE12000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE41000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE54000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE88000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BE97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEA5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEB2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BEF6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF31000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF6D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF76000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF8A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF93000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BF97000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006BFDA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C00A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C015000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C01D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C051000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C060000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C069000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C06E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C07B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C0FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C101000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C135000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C144000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C14D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C152000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C15F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1D2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C1E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C21A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C223000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C228000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C236000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C244000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C287000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2CA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C2FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C30D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C316000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C31B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C324000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C328000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C36B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C372000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C39B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C3FF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C40C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C450000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C47F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C48B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C492000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C4F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C534000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C558000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C561000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C564000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C56F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C577000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5AB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5C8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C5D5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C618000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C648000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C654000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C65B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C68F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C69E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C6FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C721000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C72C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C738000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C73F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C78B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C790000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C79E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C7E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C8F4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C900000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C907000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C93C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C945000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C94A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C958000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C966000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9A9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9D9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006C9EC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA20000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA2F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA38000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA3D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA46000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA4A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CA8D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1014696634.000000006CCD3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026102509.000000006CCD4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026124825.000000006CCE8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026140192.000000006CCE9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026156187.000000006CCF0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026173591.000000006CCF4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026389992.000000006CD84000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026453303.000000006CDE3000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026479348.000000006CDEB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026502713.000000006CDED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026628925.000000006CE9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026657763.000000006CE9C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.1026681108.000000006CE9D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_6ab50000_rundll32.jbxd
                                                Similarity
                                                • API ID: Thread$LanguagesPreferred$Language
                                                • String ID:
                                                • API String ID: 2255706666-0
                                                • Opcode ID: ebf3986fe70e32d3c8edbe4057ef82732ccad080ed5a3d6b0fd99c6c98a2fda0
                                                • Instruction ID: 8355a4954dc18feca03d9cdeb878ed3e1f6c5285c216f3d40735e3adf0cc12a6
                                                • Opcode Fuzzy Hash: ebf3986fe70e32d3c8edbe4057ef82732ccad080ed5a3d6b0fd99c6c98a2fda0
                                                • Instruction Fuzzy Hash: 21318F30E1025E9BDB00DFA8C884AAEB3F8FF0A305F4145A5E861E7291DF74DA55DB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%