Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1559921
MD5:b6232971846816075fb9476cb82148fb
SHA1:32fdc8249eb381bdc6733092b6be00d3bdab5d2e
SHA256:1a1fa8992c84f43a7d642d63ccbc350eccf35263a9aa097709ad75fa13bc69d7
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7528 cmdline: "C:\Users\user\Desktop\file.exe" MD5: B6232971846816075FB9476CB82148FB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeVirustotal: Detection: 54%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1429538509.0000000004D90000.00000004.00001000.00020000.00000000.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FD9940_2_000FD994
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026F5200_2_0026F520
Source: file.exe, 00000000.00000002.1563253184.0000000000E3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exe, 00000000.00000000.1400798345.00000000000F6000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeVirustotal: Detection: 54%
Source: file.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: file.exeString found in binary or memory: \RtlAllocateHeap3Cannot find '%s'. Please, re-install this applicationThunRTMain__vbaVarTstNeV
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2772480 > 1048576
Source: file.exeStatic PE information: Raw size of jbjemqme is bigger than: 0x100000 < 0x29ec00
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1429538509.0000000004D90000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.f0000.0.unpack :EW;.rsrc:W;.idata :W;jbjemqme:EW;ploemuvx:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2abce4 should be: 0x2af311
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: jbjemqme
Source: file.exeStatic PE information: section name: ploemuvx
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026F8F1 push ebp; mov dword ptr [esp], 6EDEFB3Ah0_2_0026F90D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026F8F1 push ecx; mov dword ptr [esp], esi0_2_0026F933
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026F8F1 push edi; mov dword ptr [esp], 77A98CE4h0_2_0026F968
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026F8F1 push ecx; mov dword ptr [esp], 594E651Bh0_2_0026FA18
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027BE84 push edx; mov dword ptr [esp], 426721DFh0_2_0027D7B8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FE80E push edx; mov dword ptr [esp], ecx0_2_000FEA75
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00100812 push edi; mov dword ptr [esp], ebx0_2_00100844
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00100812 push edi; mov dword ptr [esp], 6FF25F30h0_2_00101479
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00100812 push 25CE6358h; mov dword ptr [esp], ebp0_2_001035F5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027A03D push eax; mov dword ptr [esp], ebx0_2_0027A040
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0010100E push 2CE77462h; mov dword ptr [esp], ecx0_2_001016C6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0010100E push 7BD31BA3h; mov dword ptr [esp], esi0_2_0010265A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027C005 push 2F13232Fh; mov dword ptr [esp], ecx0_2_0027D400
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0030B87A push ebx; mov dword ptr [esp], 2BF6DE0Fh0_2_0030B8AD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0030B87A push edi; mov dword ptr [esp], ebp0_2_0030B8CE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027006C push eax; mov dword ptr [esp], 7DBF624Dh0_2_002700BC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027006C push ebp; mov dword ptr [esp], 7BFF617Ah0_2_00270117
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027006C push 4B19121Ah; mov dword ptr [esp], ecx0_2_0027019B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0010085C push ecx; mov dword ptr [esp], edi0_2_00101DF4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00270873 push 0FD8ADE9h; mov dword ptr [esp], eax0_2_002708AB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00270873 push 631C0AD1h; mov dword ptr [esp], ebx0_2_002708D4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026D0BC push edi; mov dword ptr [esp], 3B8F847Fh0_2_0026D155
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026D0BC push 06370620h; mov dword ptr [esp], ecx0_2_0026D256
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002740BD push 08235B1Ch; mov dword ptr [esp], eax0_2_00274185
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001010B3 push ecx; mov dword ptr [esp], 477F9167h0_2_00103782
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00270084 push eax; mov dword ptr [esp], 7DBF624Dh0_2_002700BC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00270084 push ebp; mov dword ptr [esp], 7BFF617Ah0_2_00270117
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00270084 push 4B19121Ah; mov dword ptr [esp], ecx0_2_0027019B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001018A4 push eax; mov dword ptr [esp], 5F0B7645h0_2_001018D2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002D20F4 push ebx; mov dword ptr [esp], edi0_2_002D20E2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001030C9 push 0C5ACD71h; mov dword ptr [esp], esi0_2_001030DB
Source: file.exeStatic PE information: section name: entropy: 7.792497844647016

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDFEF second address: FD8A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dword ptr [esp], eax 0x00000007 jmp 00007FCCF0DBDCDEh 0x0000000c push dword ptr [ebp+122D16F5h] 0x00000012 or dword ptr [ebp+122D2D1Ch], ebx 0x00000018 mov dword ptr [ebp+122D30EEh], eax 0x0000001e call dword ptr [ebp+122D29B1h] 0x00000024 pushad 0x00000025 pushad 0x00000026 add edx, dword ptr [ebp+122D3674h] 0x0000002c call 00007FCCF0DBDCDAh 0x00000031 sub dword ptr [ebp+122D1D1Dh], ebx 0x00000037 pop edx 0x00000038 popad 0x00000039 xor eax, eax 0x0000003b clc 0x0000003c mov edx, dword ptr [esp+28h] 0x00000040 cld 0x00000041 mov dword ptr [ebp+122D3500h], eax 0x00000047 jmp 00007FCCF0DBDCE7h 0x0000004c mov esi, 0000003Ch 0x00000051 mov dword ptr [ebp+122D2461h], eax 0x00000057 add esi, dword ptr [esp+24h] 0x0000005b stc 0x0000005c jnl 00007FCCF0DBDCE1h 0x00000062 lodsw 0x00000064 jmp 00007FCCF0DBDCE7h 0x00000069 add eax, dword ptr [esp+24h] 0x0000006d jnl 00007FCCF0DBDCDCh 0x00000073 mov ebx, dword ptr [esp+24h] 0x00000077 or dword ptr [ebp+122D2590h], esi 0x0000007d nop 0x0000007e pushad 0x0000007f jmp 00007FCCF0DBDCDFh 0x00000084 jl 00007FCCF0DBDCDCh 0x0000008a popad 0x0000008b push eax 0x0000008c push eax 0x0000008d push edx 0x0000008e js 00007FCCF0DBDCD8h 0x00000094 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 26FA81 second address: 26FA90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF19063FBh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 270028 second address: 270031 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 270031 second address: 270052 instructions: 0x00000000 rdtsc 0x00000002 js 00007FCCF1906402h 0x00000008 jp 00007FCCF19063F6h 0x0000000e jns 00007FCCF19063F6h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 push ebx 0x00000018 pushad 0x00000019 popad 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c pop ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 270052 second address: 270056 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 271AF1 second address: 271B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a pushad 0x0000000b jne 00007FCCF19063F8h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 271B07 second address: 271B8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FCCF0DBDCD6h 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 jns 00007FCCF0DBDCD6h 0x00000018 popad 0x00000019 push eax 0x0000001a jmp 00007FCCF0DBDCDBh 0x0000001f pop eax 0x00000020 popad 0x00000021 mov dword ptr [esp+04h], eax 0x00000025 pushad 0x00000026 jmp 00007FCCF0DBDCE1h 0x0000002b push edx 0x0000002c jmp 00007FCCF0DBDCE8h 0x00000031 pop edx 0x00000032 popad 0x00000033 pop eax 0x00000034 jno 00007FCCF0DBDCD9h 0x0000003a push 00000003h 0x0000003c movsx edi, ax 0x0000003f push 00000000h 0x00000041 jmp 00007FCCF0DBDCDBh 0x00000046 push 00000003h 0x00000048 sbb dl, 00000003h 0x0000004b push 48393998h 0x00000050 pushad 0x00000051 push eax 0x00000052 push edx 0x00000053 pushad 0x00000054 popad 0x00000055 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2840F6 second address: 2840FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 25CDF2 second address: 25CDF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 25CDF6 second address: 25CDFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291C24 second address: 291C2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291C2A second address: 291C30 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291D88 second address: 291D8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291D8C second address: 291D97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291D97 second address: 291DA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCCF0DBDCD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291DA1 second address: 291DA7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291DA7 second address: 291DB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF0DBDCDAh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291DB9 second address: 291DBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 291DBD second address: 291DC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292656 second address: 29265C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 29265C second address: 292692 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FCCF0DBDCF0h 0x0000000c jno 00007FCCF0DBDCDAh 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292692 second address: 292696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292696 second address: 29269F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C21 second address: 292C27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C27 second address: 292C38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCCF0DBDCD6h 0x0000000a popad 0x0000000b pop ecx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C38 second address: 292C3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C3C second address: 292C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C48 second address: 292C4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C4C second address: 292C65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FCCF0DBDCDDh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C65 second address: 292C69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 292C69 second address: 292C6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 293354 second address: 293358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 293358 second address: 293364 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCCF0DBDCD6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 293364 second address: 293377 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FCCF19063FEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2934EB second address: 2934EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 293663 second address: 293669 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2937DA second address: 2937F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCCF0DBDCE9h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 298C6D second address: 298C89 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FCCF1906401h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 298C89 second address: 298C93 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FCCF0DBDCD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 297522 second address: 297526 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 297D66 second address: 297D7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FCCF0DBDCDBh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 297D7E second address: 297D82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 297D82 second address: 297D9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 297D9E second address: 297DA3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 298EEB second address: 298F01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCE1h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 298F01 second address: 298F07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 298F07 second address: 298F0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 29FDC1 second address: 29FDD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FCCF19063F6h 0x0000000a popad 0x0000000b push ebx 0x0000000c push esi 0x0000000d pop esi 0x0000000e pop ebx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 29FDD0 second address: 29FDDA instructions: 0x00000000 rdtsc 0x00000002 jc 00007FCCF0DBDCDCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 29FDDA second address: 29FDF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007FCCF19063FFh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 29FF8F second address: 29FF99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A00F8 second address: 2A0102 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A0102 second address: 2A0106 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A0106 second address: 2A010C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A03C2 second address: 2A03FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FCCF0DBDCDBh 0x0000000b jmp 00007FCCF0DBDCE7h 0x00000010 popad 0x00000011 pushad 0x00000012 push eax 0x00000013 pop eax 0x00000014 js 00007FCCF0DBDCD6h 0x0000001a push esi 0x0000001b pop esi 0x0000001c jo 00007FCCF0DBDCD6h 0x00000022 popad 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A0520 second address: 2A053F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007FCCF1906405h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A0FF7 second address: 2A0FFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A1397 second address: 2A13B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FCCF19063F6h 0x0000000a popad 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jno 00007FCCF1906402h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A13B8 second address: 2A13C2 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCCF0DBDCDCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A142C second address: 2A144E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906406h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007FCCF19063F6h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A1BF1 second address: 2A1BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A1C80 second address: 2A1C87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A1C87 second address: 2A1CA8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop ecx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A1D4F second address: 2A1D53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A25E4 second address: 2A25E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A25E8 second address: 2A25EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A25EE second address: 2A2651 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov esi, 18F552C0h 0x0000000e mov esi, 2C766A1Ch 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 mov di, bx 0x00000019 pop edi 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push ebx 0x0000001f call 00007FCCF0DBDCD8h 0x00000024 pop ebx 0x00000025 mov dword ptr [esp+04h], ebx 0x00000029 add dword ptr [esp+04h], 00000014h 0x00000031 inc ebx 0x00000032 push ebx 0x00000033 ret 0x00000034 pop ebx 0x00000035 ret 0x00000036 push edx 0x00000037 mov di, 125Ah 0x0000003b pop esi 0x0000003c mov si, 3B07h 0x00000040 xchg eax, ebx 0x00000041 jmp 00007FCCF0DBDCE4h 0x00000046 push eax 0x00000047 pushad 0x00000048 pushad 0x00000049 push edi 0x0000004a pop edi 0x0000004b pushad 0x0000004c popad 0x0000004d popad 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A2651 second address: 2A2655 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A3069 second address: 2A3073 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FCCF0DBDCD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A2E59 second address: 2A2E5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A40D3 second address: 2A415B instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCCF0DBDCDCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FCCF0DBDCD8h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 push 00000000h 0x00000029 jmp 00007FCCF0DBDCDEh 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push ebp 0x00000033 call 00007FCCF0DBDCD8h 0x00000038 pop ebp 0x00000039 mov dword ptr [esp+04h], ebp 0x0000003d add dword ptr [esp+04h], 00000016h 0x00000045 inc ebp 0x00000046 push ebp 0x00000047 ret 0x00000048 pop ebp 0x00000049 ret 0x0000004a call 00007FCCF0DBDCE3h 0x0000004f xor dword ptr [ebp+1246FE36h], eax 0x00000055 pop esi 0x00000056 mov edi, 3C99BC94h 0x0000005b push eax 0x0000005c js 00007FCCF0DBDCE0h 0x00000062 pushad 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A38F5 second address: 2A38F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A38F9 second address: 2A38FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A4D06 second address: 2A4D11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FCCF19063F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A7705 second address: 2A770A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AA81D second address: 2AA824 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AC842 second address: 2AC85F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCCF0DBDCE9h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A69B2 second address: 2A69B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A7492 second address: 2A74B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCE9h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AAA16 second address: 2AAA1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AC85F second address: 2AC8AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007FCCF0DBDCD8h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 00000016h 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 and ebx, 0B8513BBh 0x00000029 push 00000000h 0x0000002b sub edi, 35E11DEDh 0x00000031 mov dword ptr [ebp+12456597h], eax 0x00000037 push 00000000h 0x00000039 xor dword ptr [ebp+122D2590h], edx 0x0000003f xchg eax, esi 0x00000040 pushad 0x00000041 pushad 0x00000042 jo 00007FCCF0DBDCD6h 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A69B6 second address: 2A69D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906405h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A69D7 second address: 2A69DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A69DB second address: 2A69F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906402h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AF7E4 second address: 2AF7EE instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FCCF0DBDCD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AE94D second address: 2AE951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AF7EE second address: 2AF869 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FCCF0DBDCE0h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007FCCF0DBDCD8h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 00000018h 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 jp 00007FCCF0DBDCDCh 0x0000002e mov ebx, dword ptr [ebp+122D1EC9h] 0x00000034 push 00000000h 0x00000036 call 00007FCCF0DBDCDAh 0x0000003b mov edi, 72372AF2h 0x00000040 pop edi 0x00000041 push 00000000h 0x00000043 xchg eax, esi 0x00000044 jo 00007FCCF0DBDCF6h 0x0000004a pushad 0x0000004b jmp 00007FCCF0DBDCE8h 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AE951 second address: 2AE957 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2ADB39 second address: 2ADB3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AF869 second address: 2AF892 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 jnp 00007FCCF190640Fh 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AE957 second address: 2AE95B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2ADB3D second address: 2ADB51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF19063FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2ADB51 second address: 2ADB57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AEA2F second address: 2AEA34 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2ADB57 second address: 2ADB6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 jg 00007FCCF0DBDCD8h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2ADB6B second address: 2ADB6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B0BFE second address: 2B0C02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B1CB6 second address: 2B1CE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FCCF1906402h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCCF1906402h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B2B74 second address: 2B2BED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jno 00007FCCF0DBDCDCh 0x0000000b popad 0x0000000c nop 0x0000000d jmp 00007FCCF0DBDCE0h 0x00000012 push 00000000h 0x00000014 and ebx, dword ptr [ebp+122D367Ch] 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push ecx 0x0000001f call 00007FCCF0DBDCD8h 0x00000024 pop ecx 0x00000025 mov dword ptr [esp+04h], ecx 0x00000029 add dword ptr [esp+04h], 0000001Bh 0x00000031 inc ecx 0x00000032 push ecx 0x00000033 ret 0x00000034 pop ecx 0x00000035 ret 0x00000036 xor ebx, dword ptr [ebp+122D3498h] 0x0000003c mov dword ptr [ebp+12456597h], eax 0x00000042 xchg eax, esi 0x00000043 jno 00007FCCF0DBDCE2h 0x00000049 push eax 0x0000004a push ecx 0x0000004b push eax 0x0000004c push edx 0x0000004d jl 00007FCCF0DBDCD6h 0x00000053 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2AFB14 second address: 2AFB1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FCCF19063F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B49CF second address: 2B49D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B5BE2 second address: 2B5BE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B5BE6 second address: 2B5C47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCCF0DBDCDDh 0x0000000b popad 0x0000000c nop 0x0000000d mov ebx, dword ptr [ebp+122D372Ch] 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ebp 0x00000018 call 00007FCCF0DBDCD8h 0x0000001d pop ebp 0x0000001e mov dword ptr [esp+04h], ebp 0x00000022 add dword ptr [esp+04h], 00000018h 0x0000002a inc ebp 0x0000002b push ebp 0x0000002c ret 0x0000002d pop ebp 0x0000002e ret 0x0000002f mov ebx, dword ptr [ebp+122D316Ah] 0x00000035 js 00007FCCF0DBDCDCh 0x0000003b add edi, 09A02D21h 0x00000041 push 00000000h 0x00000043 cmc 0x00000044 push eax 0x00000045 push eax 0x00000046 push edx 0x00000047 jns 00007FCCF0DBDCDCh 0x0000004d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B2D06 second address: 2B2D18 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCCF19063F8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B2D18 second address: 2B2D1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B7B87 second address: 2B7B98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007FCCF19063F6h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B7B98 second address: 2B7BAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B6DD0 second address: 2B6DD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B6DD4 second address: 2B6DDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B8C1F second address: 2B8C25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B8C25 second address: 2B8C29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2B9C18 second address: 2B9C1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D2F70 second address: 2D2F74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D3150 second address: 2D31A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906409h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FCCF1906405h 0x00000010 pop edx 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 jp 00007FCCF1906400h 0x0000001b mov eax, dword ptr [eax] 0x0000001d push eax 0x0000001e push edx 0x0000001f push edx 0x00000020 jmp 00007FCCF19063FAh 0x00000025 pop edx 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D7851 second address: 2D7877 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCCF0DBDCF1h 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D7D08 second address: 2D7D15 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push esi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D7E56 second address: 2D7E5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D7E5A second address: 2D7E88 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCCF19063F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b js 00007FCCF19063F6h 0x00000011 jmp 00007FCCF19063FBh 0x00000016 popad 0x00000017 pop edx 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FCCF19063FDh 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2D810D second address: 2D8119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 popad 0x00000008 push ecx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 25E857 second address: 25E861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FCCF19063F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 25E861 second address: 25E867 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 25E867 second address: 25E886 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF19063FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e push edi 0x0000000f pop edi 0x00000010 push edi 0x00000011 pop edi 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 25E886 second address: 25E897 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCCF0DBDCD6h 0x0000000a jl 00007FCCF0DBDCD6h 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DCDE2 second address: 2DCDEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FCCF19063F6h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DCF41 second address: 2DCF46 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DD203 second address: 2DD208 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DD749 second address: 2DD74D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DD74D second address: 2DD753 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DD753 second address: 2DD79A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push edi 0x0000000a pop edi 0x0000000b jmp 00007FCCF0DBDCDAh 0x00000010 jmp 00007FCCF0DBDCE1h 0x00000015 popad 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FCCF0DBDCE6h 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DDAA6 second address: 2DDABA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906400h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DDABA second address: 2DDAC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DDAC2 second address: 2DDAE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF19063FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push edx 0x0000000d pop edx 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 je 00007FCCF19063F6h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2DDAE8 second address: 2DDAF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnc 00007FCCF0DBDCD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1AE0 second address: 2E1B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 jmp 00007FCCF1906408h 0x0000000a pop esi 0x0000000b pushad 0x0000000c jo 00007FCCF19063F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B07 second address: 2E1B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B0D second address: 2E1B13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B13 second address: 2E1B26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF0DBDCDBh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B26 second address: 2E1B2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B2C second address: 2E1B32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B32 second address: 2E1B36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B36 second address: 2E1B3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B3A second address: 2E1B51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF19063FFh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E1B51 second address: 2E1B57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E70A1 second address: 2E70B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push esi 0x00000007 pushad 0x00000008 jnc 00007FCCF19063F6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E7219 second address: 2E721D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E765A second address: 2E765F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E7953 second address: 2E795E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push esi 0x00000009 pop esi 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2E7AC6 second address: 2E7AE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push esi 0x00000007 pop esi 0x00000008 jmp 00007FCCF1906408h 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EBAF5 second address: 2EBB1B instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCCF0DBDCF1h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EBB1B second address: 2EBB27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FCCF19063F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A8FB0 second address: 2A8FDB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007FCCF0DBDCD6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, esi 0x0000000d push ecx 0x0000000e mov dx, 1489h 0x00000012 pop ecx 0x00000013 nop 0x00000014 jns 00007FCCF0DBDCDCh 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jnl 00007FCCF0DBDCD8h 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A90FB second address: 2A9116 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906407h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A9116 second address: 2A9146 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edi 0x00000006 pop edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FCCF0DBDCE7h 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 jbe 00007FCCF0DBDCD6h 0x0000001d pop ecx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A92FF second address: 2A9303 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A9303 second address: 2A9309 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A96F6 second address: 2A96FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A9AB7 second address: 2A9ACD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FCCF0DBDCDCh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A9ACD second address: 2A9B11 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCCF1906408h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007FCCF19063FEh 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 jmp 00007FCCF1906400h 0x0000001d pop esi 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EBFB5 second address: 2EBFBB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC0E4 second address: 2EC11A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c jmp 00007FCCF1906406h 0x00000011 jo 00007FCCF19063F6h 0x00000017 popad 0x00000018 jmp 00007FCCF19063FDh 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC27F second address: 2EC294 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007FCCF0DBDCD6h 0x0000000f jl 00007FCCF0DBDCD6h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC294 second address: 2EC29F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC29F second address: 2EC2A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC2A8 second address: 2EC2AD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC2AD second address: 2EC2C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCE4h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC567 second address: 2EC56C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC56C second address: 2EC585 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FCCF0DBDCEBh 0x00000008 jmp 00007FCCF0DBDCDFh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC585 second address: 2EC594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007FCCF19063F6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC857 second address: 2EC85B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC85B second address: 2EC85F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC85F second address: 2EC869 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2EC869 second address: 2EC87F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906402h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F0AF8 second address: 2F0B0F instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCCF0DBDCD6h 0x00000008 jnc 00007FCCF0DBDCD6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push ecx 0x00000011 push edx 0x00000012 pop edx 0x00000013 pop ecx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F2F74 second address: 2F2F80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F2F80 second address: 2F2F84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F2F84 second address: 2F2F9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF19063FFh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F654D second address: 2F6553 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 268749 second address: 26878A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FCCF1906405h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 pop eax 0x00000012 push edi 0x00000013 pop edi 0x00000014 popad 0x00000015 jbe 00007FCCF190640Ch 0x0000001b jmp 00007FCCF1906400h 0x00000020 jc 00007FCCF19063F6h 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 26878A second address: 2687AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE8h 0x00000007 pushad 0x00000008 jnc 00007FCCF0DBDCD6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2687AD second address: 2687B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F5DE0 second address: 2F5DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2F625E second address: 2F6262 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FB628 second address: 2FB635 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 je 00007FCCF0DBDCDCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FB635 second address: 2FB651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push ecx 0x00000007 jmp 00007FCCF19063FEh 0x0000000c pushad 0x0000000d popad 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FB651 second address: 2FB660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCDBh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FA856 second address: 2FA865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007FCCF19063F6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FA865 second address: 2FA875 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FCCF0DBDCD6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FA875 second address: 2FA88E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF19063FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FAB3C second address: 2FAB4C instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCCF0DBDCD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FAB4C second address: 2FAB50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FAB50 second address: 2FAB58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FAB58 second address: 2FABA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCCF19063FEh 0x00000008 jmp 00007FCCF1906406h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 ja 00007FCCF1906409h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FABA2 second address: 2FABA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FAE75 second address: 2FAEA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FCCF19063FCh 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007FCCF1906409h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FAFD6 second address: 2FAFDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2FB13F second address: 2FB14B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 300028 second address: 300037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 jo 00007FCCF0DBDCD6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 300420 second address: 300424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30057D second address: 300585 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 300585 second address: 30058B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30058B second address: 3005A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCE4h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A954E second address: 2A9554 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A9554 second address: 2A95AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b sub dword ptr [ebp+122D24B0h], eax 0x00000011 add esi, dword ptr [ebp+122D36E8h] 0x00000017 popad 0x00000018 push 00000004h 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007FCCF0DBDCD8h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 0000001Dh 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 mov edi, edx 0x00000036 push eax 0x00000037 push edi 0x00000038 push eax 0x00000039 push edx 0x0000003a push ebx 0x0000003b pop ebx 0x0000003c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 300869 second address: 30086D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3009B2 second address: 3009B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3009B8 second address: 3009BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3009BE second address: 3009D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 305620 second address: 305626 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 304D83 second address: 304D87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 304D87 second address: 304D97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jg 00007FCCF19063FCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 305332 second address: 30533D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FCCF0DBDCD6h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30D340 second address: 30D34A instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCCF19063F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30D34A second address: 30D35E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007FCCF0DBDCDEh 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30D35E second address: 30D363 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30B31E second address: 30B323 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30B323 second address: 30B32E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30BBEF second address: 30BBF6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30BF26 second address: 30BF5D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF1906406h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FCCF19063FAh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FCCF1906401h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30C24C second address: 30C266 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE6h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30C526 second address: 30C52B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30C52B second address: 30C531 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30CD62 second address: 30CD6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30CD6B second address: 30CD6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30CD6F second address: 30CD73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30CD73 second address: 30CD7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30D033 second address: 30D050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF1906408h 0x00000009 pop ebx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 30D050 second address: 30D066 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007FCCF0DBDCDFh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3114BC second address: 3114C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 311662 second address: 31167B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF0DBDCDBh 0x0000000d jo 00007FCCF0DBDCD6h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 312044 second address: 31204F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FCCF19063F6h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31700C second address: 317012 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 317012 second address: 317018 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 317018 second address: 31701C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31D61A second address: 31D627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnc 00007FCCF19063F6h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31D627 second address: 31D644 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE9h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31D7CB second address: 31D7DD instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FCCF19063F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31D7DD second address: 31D7E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007FCCF0DBDCD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31DA50 second address: 31DA54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31DA54 second address: 31DA82 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FCCF0DBDCDBh 0x0000000e pop ecx 0x0000000f pushad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31DA82 second address: 31DA8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31DA8A second address: 31DA90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31DF01 second address: 31DF12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCCF19063FBh 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31DF12 second address: 31DF26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007FCCF0DBDCD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c js 00007FCCF0DBDCDCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31E2FF second address: 31E303 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31E303 second address: 31E33A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCE4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FCCF0DBDCDCh 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 jg 00007FCCF0DBDCD6h 0x0000001b popad 0x0000001c pushad 0x0000001d push edi 0x0000001e pop edi 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EAEB second address: 31EAF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FCCF19063F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EAF5 second address: 31EB0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF0DBDCDDh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EB0C second address: 31EB10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EB10 second address: 31EB28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCDEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EB28 second address: 31EB2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EB2F second address: 31EB4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCCF0DBDCE2h 0x00000009 jo 00007FCCF0DBDCD6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 31EB4B second address: 31EB4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3242F4 second address: 324302 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCDAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 328639 second address: 32863D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 336B80 second address: 336B88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 336B88 second address: 336B8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 336B8E second address: 336B95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 336B95 second address: 336BAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007FCCF1906403h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 336BAE second address: 336BE2 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCCF0DBDCD6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 jmp 00007FCCF0DBDCDAh 0x00000018 popad 0x00000019 push esi 0x0000001a push edi 0x0000001b pop edi 0x0000001c jmp 00007FCCF0DBDCE2h 0x00000021 pop esi 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 339DF6 second address: 339DFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 339DFA second address: 339E00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 33980B second address: 33981E instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCCF19063F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jg 00007FCCF19063F6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 33981E second address: 339823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 33998B second address: 33999A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007FCCF19063F6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345D01 second address: 345D05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B4B second address: 345B51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B51 second address: 345B55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B55 second address: 345B59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B59 second address: 345B5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B5F second address: 345B7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF19063FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jmp 00007FCCF19063FCh 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B7E second address: 345B82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 345B82 second address: 345B9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCCF1906404h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 34BE39 second address: 34BE72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 jmp 00007FCCF0DBDCE1h 0x0000000b jmp 00007FCCF0DBDCDAh 0x00000010 pop edi 0x00000011 jmp 00007FCCF0DBDCE4h 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356CCB second address: 356CD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FCCF19063F8h 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356CD9 second address: 356CEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCCF0DBDCE2h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356CEF second address: 356CF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356CF9 second address: 356CFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356CFD second address: 356D01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356F8E second address: 356F96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356F96 second address: 356F9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356F9C second address: 356FA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FCCF0DBDCD6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 356FA8 second address: 356FC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FCCF1906404h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3573D0 second address: 3573F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jng 00007FCCF0DBDCD6h 0x0000000f push eax 0x00000010 pop eax 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FCCF0DBDCE3h 0x00000018 popad 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 35D3C5 second address: 35D3C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 35D3C9 second address: 35D3CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37274F second address: 37276F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF1906409h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37276F second address: 37277B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37277B second address: 37277F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 374FE9 second address: 374FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 374FF1 second address: 374FFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FCCF19063F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 374FFD second address: 375004 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 375004 second address: 375034 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jg 00007FCCF19063F6h 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 jmp 00007FCCF1906403h 0x00000015 pop edx 0x00000016 pop eax 0x00000017 jl 00007FCCF1906404h 0x0000001d pushad 0x0000001e push edi 0x0000001f pop edi 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 374E61 second address: 374E6D instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCCF0DBDCD6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 377121 second address: 377168 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCCF19063F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007FCCF1906404h 0x00000015 jng 00007FCCF1906414h 0x0000001b jmp 00007FCCF19063FAh 0x00000020 jmp 00007FCCF1906404h 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 377168 second address: 37716D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37716D second address: 377175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 376CFE second address: 376D18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FCCF0DBDCE1h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 376E85 second address: 376E92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007FCCF19063F6h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37A4A6 second address: 37A4AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37A4AA second address: 37A4B3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 37FC50 second address: 37FC56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38005D second address: 380067 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCCF19063FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 380067 second address: 3800AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF0DBDCE6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FCCF0DBDCDCh 0x00000011 jmp 00007FCCF0DBDCE9h 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38037F second address: 380384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 381E65 second address: 381E6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 381E6B second address: 381E70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 381E70 second address: 381E7A instructions: 0x00000000 rdtsc 0x00000002 je 00007FCCF0DBDCDCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38562D second address: 385631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 385631 second address: 385648 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF0DBDCE0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 385648 second address: 385667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCCF1906409h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38A7FE second address: 38A803 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38DE90 second address: 38DE9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FCCF19063F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38FAEE second address: 38FAF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38FAF4 second address: 38FAFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FCCF19063F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38FAFE second address: 38FB21 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FCCF0DBDCD6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jl 00007FCCF0DBDCEAh 0x00000014 jne 00007FCCF0DBDCDCh 0x0000001a push ecx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 386730 second address: 386735 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 385170 second address: 38517C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FCCF0DBDCDEh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 385311 second address: 38533F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007FCCF1906404h 0x0000000b jp 00007FCCF19063FEh 0x00000011 push edi 0x00000012 pop edi 0x00000013 jng 00007FCCF19063F6h 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c push ecx 0x0000001d push edx 0x0000001e pop edx 0x0000001f pop ecx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38533F second address: 38534B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FCCF0DBDCD6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38534B second address: 38535E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCCF19063FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 38535E second address: 38536C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jno 00007FCCF0DBDCD6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3854DD second address: 3854E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A3BBC second address: 2A3BC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 2A3BC7 second address: 2A3BCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: FD7EA instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: FD8F7 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: FD811 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 2A899F instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 32E8EA instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 10207F instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4E20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 51D0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4FF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00271E35 rdtsc 0_2_00271E35
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7724Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002CE743 GetSystemInfo,VirtualAlloc,0_2_002CE743
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00273DE0 Start: 00273DF3 End: 00273DED0_2_00273DE0
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00271E35 rdtsc 0_2_00271E35
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FB7DA LdrInitializeThunk,0_2_000FB7DA
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, file.exe, 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Qx>Program Manager

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping641
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
261
Virtualization/Sandbox Evasion
Security Account Manager261
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS23
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Bypass User Account Control
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe55%VirustotalBrowse
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1559921
Start date and time:2024-11-21 06:23:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.514190128774051
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'772'480 bytes
MD5:b6232971846816075fb9476cb82148fb
SHA1:32fdc8249eb381bdc6733092b6be00d3bdab5d2e
SHA256:1a1fa8992c84f43a7d642d63ccbc350eccf35263a9aa097709ad75fa13bc69d7
SHA512:7f861f5086dddbd0939f303a78b1ad00464d666171448e7d386318b988a09434ace95288dbe0f4dc51cca39dacbed97b405b111e149ca31d3ca1ff4f3cab781a
SSDEEP:49152:h0Sk1NiPWUBwqbUUBgxIRripJuQRkjEGC:q1NWWUvbUIgxIRr8JuQRPGC
TLSH:05D53B92A407B1CFD89E1B74A527CD826E6D43B94B2409C3EC5DA5BA7D63CC112F6C38
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$............*.. ...`....@.. ........................+.......*...`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x6ac000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007FCCF086024Ah
cvttps2pi mm5, qword ptr [edx]
add byte ptr [eax], al
add byte ptr [eax], al
add cl, ch
add byte ptr [eax], ah
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x120038146e81d35e7a7a08d7cdbad94583eeFalse0.9325086805555556data7.792497844647016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
jbjemqme0xa0000x2a00000x29ec00f8ae78c30af2bf7e14643b4091981f6cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
ploemuvx0x2aa0000x20000x6001aff643d92fa7ab66d5f98ce1d796cbfFalse0.5904947916666666data5.0713391687192155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2ac0000x40000x220012efe35b337c8f7f49ea3bff0dbd9b24False0.006433823529411764DOS executable (COM)0.019571456231530684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:00:24:02
Start date:21/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0xf0000
File size:2'772'480 bytes
MD5 hash:B6232971846816075FB9476CB82148FB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:6.4%
    Dynamic/Decrypted Code Coverage:3%
    Signature Coverage:5.6%
    Total number of Nodes:303
    Total number of Limit Nodes:18
    execution_graph 6988 27be84 6989 27bfd6 LoadLibraryA 6988->6989 6736 103b14 6737 103b2c 6736->6737 6739 101d57 6736->6739 6738 101d97 6739->6738 6741 2ce8e4 6739->6741 6742 2ce8f2 6741->6742 6743 2ce912 6742->6743 6745 2cebb4 6742->6745 6743->6738 6746 2cebe7 6745->6746 6747 2cebc4 6745->6747 6746->6742 6747->6746 6749 2cefae 6747->6749 6751 2cefb5 6749->6751 6752 2cefff 6751->6752 6754 2ceebc 6751->6754 6758 2cf16f 6751->6758 6752->6746 6757 2ceed1 6754->6757 6755 2cef91 6755->6751 6756 2cef5b GetModuleFileNameA 6756->6757 6757->6755 6757->6756 6761 2cf183 6758->6761 6759 2cf19b 6759->6751 6760 2cf2be VirtualProtect 6760->6761 6761->6759 6761->6760 6762 fee49 VirtualAlloc 6763 fee61 6762->6763 6764 2c5deb 6765 2c5e09 6764->6765 6767 2c5e46 6765->6767 6768 2c57b2 6765->6768 6777 2c393a 6768->6777 6770 2c58ba 6770->6767 6771 2c57f8 CreateFileA 6772 2c5844 6771->6772 6772->6770 6781 2c367c 6772->6781 6773 2c57bf 6773->6770 6773->6771 6778 2c3944 6777->6778 6779 2c394d RtlAllocateHeap 6778->6779 6780 2c395b 6778->6780 6779->6780 6780->6773 6782 2c393a RtlAllocateHeap 6781->6782 6783 2c368a 6782->6783 6783->6770 6784 2c5675 CloseHandle 6783->6784 6785 2c5689 6784->6785 6785->6770 6991 2c53cb 6993 2c53d7 6991->6993 6994 2c53eb 6993->6994 6996 2c53f3 6993->6996 6999 2c3998 6994->6999 6998 2c5413 6996->6998 7003 2c542c 6996->7003 7000 2c39b6 6999->7000 7001 2c393a RtlAllocateHeap 7000->7001 7002 2c39c0 7001->7002 7002->6996 7005 2c5435 7003->7005 7006 2c5444 7005->7006 7007 2c544c 7006->7007 7008 2c385c GetCurrentThreadId 7006->7008 7010 2c54fd GetModuleHandleA 7007->7010 7011 2c54ef GetModuleHandleW 7007->7011 7009 2c5456 7008->7009 7012 2c5471 7009->7012 7013 2c3f6e 2 API calls 7009->7013 7014 2c5484 7010->7014 7011->7014 7012->7007 7012->7014 7013->7012 7015 4e20d48 7016 4e20d93 OpenSCManagerW 7015->7016 7018 4e20ddc 7016->7018 7019 4e21308 7020 4e21349 ImpersonateLoggedOnUser 7019->7020 7021 4e21376 7020->7021 7022 2cf747 7024 2cf753 7022->7024 7025 2cf765 7024->7025 7026 2c4ebb 18 API calls 7025->7026 7027 2cf774 7026->7027 7028 2cf78d 7027->7028 7029 2cf304 2 API calls 7027->7029 7029->7028 7030 271d89 7031 271d99 CreateFileA 7030->7031 7033 271dca 7031->7033 7034 2ce743 GetSystemInfo 7035 2ce7a1 VirtualAlloc 7034->7035 7036 2ce763 7034->7036 7049 2cea8f 7035->7049 7036->7035 7038 2ce7e8 7039 2ce8bd 7038->7039 7040 2cea8f VirtualAlloc GetModuleFileNameA VirtualProtect 7038->7040 7041 2ce8d9 GetModuleFileNameA VirtualProtect 7039->7041 7048 2ce881 7039->7048 7042 2ce812 7040->7042 7041->7048 7042->7039 7043 2cea8f VirtualAlloc GetModuleFileNameA VirtualProtect 7042->7043 7044 2ce83c 7043->7044 7044->7039 7045 2cea8f VirtualAlloc GetModuleFileNameA VirtualProtect 7044->7045 7046 2ce866 7045->7046 7046->7039 7047 2cea8f VirtualAlloc GetModuleFileNameA VirtualProtect 7046->7047 7046->7048 7047->7039 7051 2cea97 7049->7051 7052 2ceaab 7051->7052 7053 2ceac3 7051->7053 7059 2ce95b 7052->7059 7055 2ce95b 2 API calls 7053->7055 7056 2cead4 7055->7056 7061 2ceae6 7056->7061 7064 2ce963 7059->7064 7062 2ceaf7 VirtualAlloc 7061->7062 7063 2ceae2 7061->7063 7062->7063 7065 2ce976 7064->7065 7066 2cefae 2 API calls 7065->7066 7067 2ce9b9 7065->7067 7066->7067 7068 271f17 7069 271f28 CreateFileA 7068->7069 7070 271f41 7068->7070 7069->7070 7071 2cf6dd 7073 2cf6e9 7071->7073 7074 2cf6fb 7073->7074 7075 2cf304 2 API calls 7074->7075 7076 2cf70d 7075->7076 7077 2c551e 7078 2c385c GetCurrentThreadId 7077->7078 7080 2c552a 7078->7080 7079 2c5548 7082 2c5579 GetModuleHandleExA 7079->7082 7083 2c5550 7079->7083 7080->7079 7081 2c3f6e 2 API calls 7080->7081 7081->7079 7082->7083 7084 4e21510 7085 4e21558 ControlService 7084->7085 7086 4e2158f 7085->7086 6786 fb7da 6787 fb7df 6786->6787 6788 fb94a LdrInitializeThunk 6787->6788 6789 26f8f1 LoadLibraryA 6790 26f90b 6789->6790 6791 2c56b4 6792 2c56de 6791->6792 6793 2c367c RtlAllocateHeap 6792->6793 6796 2c572c 6792->6796 6793->6796 6794 2c5771 6796->6794 6797 2c569c 6796->6797 6800 2c3707 6797->6800 6801 2c371d 6800->6801 6802 2c3737 6801->6802 6804 2c36eb 6801->6804 6802->6794 6805 2c5675 CloseHandle 6804->6805 6806 2c36fb 6805->6806 6806->6802 6807 fe396 6808 fe70b VirtualAlloc 6807->6808 7087 2c5597 7089 2c55a3 7087->7089 7090 2c55b7 7089->7090 7092 2c55bf 7089->7092 7091 2c3998 RtlAllocateHeap 7090->7091 7091->7092 6809 2c5073 6812 2c4ebb 6809->6812 6815 2c4f22 6812->6815 6814 2c4ed0 6817 2c4f2f 6815->6817 6820 2c4f45 6817->6820 6818 2c4f4d 6823 2c502d 6818->6823 6824 2c501a 6818->6824 6819 2c4f6a 6834 2c385c GetCurrentThreadId 6819->6834 6820->6818 6820->6819 6840 2cf9b6 6820->6840 6827 2c504b LoadLibraryExA 6823->6827 6828 2c5037 LoadLibraryExW 6823->6828 6862 2c4d5a 6824->6862 6825 2c4f6f 6836 2c3f6e 6825->6836 6833 2c4ff1 6827->6833 6828->6833 6831 2c4fae 6842 2c489a 6831->6842 6835 2c3874 6834->6835 6835->6825 6837 2c3fbc 6836->6837 6838 2c3f7f 6836->6838 6837->6818 6837->6831 6838->6837 6866 2c3e0f 6838->6866 6886 2cf9c5 6840->6886 6843 2c48b6 6842->6843 6844 2c48c0 6842->6844 6843->6833 6894 2c40ed 6844->6894 6849 2c49ba 6849->6843 6926 2c50ac 6849->6926 6852 2c4910 6852->6849 6853 2c493d 6852->6853 6904 2c42cb 6852->6904 6908 2c4566 6853->6908 6856 2c4948 6856->6849 6913 2c44dd 6856->6913 6858 2c4975 6858->6849 6859 2c499d 6858->6859 6917 2cf60b 6858->6917 6859->6849 6921 2cf304 6859->6921 6863 2c4d65 6862->6863 6864 2c4d75 6863->6864 6865 2c4d86 LoadLibraryExA 6863->6865 6864->6833 6865->6864 6868 2c3e3c 6866->6868 6867 2c3f42 6867->6838 6868->6867 6869 2c3e6a PathAddExtensionA 6868->6869 6870 2c3e85 6868->6870 6869->6870 6875 2c3ea7 6870->6875 6878 2c3ab0 6870->6878 6872 2c3ef0 6872->6867 6873 2c3f19 6872->6873 6874 2c3ab0 lstrcmpiA 6872->6874 6873->6867 6877 2c3ab0 lstrcmpiA 6873->6877 6874->6873 6875->6867 6875->6872 6876 2c3ab0 lstrcmpiA 6875->6876 6876->6872 6877->6867 6880 2c3ace 6878->6880 6879 2c3ae5 6879->6875 6880->6879 6882 2c3a2d 6880->6882 6883 2c3a58 6882->6883 6884 2c3a8a lstrcmpiA 6883->6884 6885 2c3aa0 6883->6885 6884->6885 6885->6879 6887 2cf9d5 6886->6887 6888 2c385c GetCurrentThreadId 6887->6888 6893 2cfa27 6887->6893 6889 2cfa3d 6888->6889 6890 2c3f6e 2 API calls 6889->6890 6891 2cfa4f 6890->6891 6892 2c3f6e 2 API calls 6891->6892 6891->6893 6892->6893 6895 2c4109 6894->6895 6896 2c4162 6894->6896 6895->6896 6897 2c4139 VirtualAlloc 6895->6897 6896->6843 6898 2c4193 VirtualAlloc 6896->6898 6897->6896 6899 2c41d8 6898->6899 6899->6849 6900 2c4210 6899->6900 6902 2c4238 6900->6902 6901 2c42af 6901->6852 6902->6901 6903 2c4251 VirtualAlloc 6902->6903 6903->6901 6903->6902 6905 2c42e6 6904->6905 6907 2c42eb 6904->6907 6905->6853 6906 2c431e lstrcmpiA 6906->6905 6906->6907 6907->6905 6907->6906 6910 2c4672 6908->6910 6911 2c4593 6908->6911 6910->6856 6911->6910 6928 2c4078 6911->6928 6938 2c5189 6911->6938 6914 2c4506 6913->6914 6915 2c4547 6914->6915 6916 2c451e VirtualProtect 6914->6916 6915->6858 6916->6914 6916->6915 6918 2cf6d8 6917->6918 6919 2cf627 6917->6919 6918->6859 6919->6918 6920 2cf16f VirtualProtect 6919->6920 6920->6919 6922 2cf315 6921->6922 6923 2cf398 6921->6923 6922->6923 6924 2cefae 2 API calls 6922->6924 6925 2cf16f VirtualProtect 6922->6925 6923->6849 6924->6922 6925->6922 6968 2c50b8 6926->6968 6929 2c4ebb 18 API calls 6928->6929 6931 2c408b 6929->6931 6930 2c40d1 6930->6911 6931->6930 6932 2c40dd 6931->6932 6933 2c40b4 6931->6933 6935 2c50ac 2 API calls 6932->6935 6940 2c35d5 6933->6940 6935->6930 6937 2c50ac 2 API calls 6937->6930 6943 2c5192 6938->6943 6941 2c393a RtlAllocateHeap 6940->6941 6942 2c35e3 6941->6942 6942->6930 6942->6937 6944 2c51a1 6943->6944 6946 2c385c GetCurrentThreadId 6944->6946 6948 2c51a9 6944->6948 6945 2c51d6 GetProcAddress 6951 2c51cc 6945->6951 6947 2c51b3 6946->6947 6947->6948 6949 2c51c3 6947->6949 6948->6945 6952 2c4bea 6949->6952 6953 2c4cd6 6952->6953 6954 2c4c09 6952->6954 6953->6951 6954->6953 6955 2c4c46 lstrcmpiA 6954->6955 6956 2c4c70 6954->6956 6955->6954 6955->6956 6956->6953 6958 2c4b33 6956->6958 6959 2c4b44 6958->6959 6960 2c393a RtlAllocateHeap 6959->6960 6967 2c4bcf 6959->6967 6961 2c4b6c 6960->6961 6962 2c4b74 lstrcpyn 6961->6962 6961->6967 6964 2c4b90 6962->6964 6962->6967 6963 2c4078 17 API calls 6965 2c4bbe 6963->6965 6964->6963 6964->6967 6966 2c5189 17 API calls 6965->6966 6965->6967 6966->6967 6967->6953 6969 2c50c7 6968->6969 6971 2c385c GetCurrentThreadId 6969->6971 6973 2c50cf 6969->6973 6970 2c511d FreeLibrary 6976 2c5104 6970->6976 6972 2c50d9 6971->6972 6972->6973 6974 2c50e9 6972->6974 6973->6970 6977 2c4a9a 6974->6977 6978 2c4afd 6977->6978 6979 2c4abd 6977->6979 6978->6976 6979->6978 6981 2c3656 6979->6981 6982 2c365f 6981->6982 6983 2c3677 6982->6983 6985 2c363d 6982->6985 6983->6978 6986 2c50ac 2 API calls 6985->6986 6987 2c364a 6986->6987 6987->6982 7093 2cf793 7095 2cf79f 7093->7095 7096 2cf7b1 7095->7096 7101 2c4ed4 7096->7101 7098 2cf7c0 7099 2cf7d9 7098->7099 7100 2cf304 GetModuleFileNameA VirtualProtect 7098->7100 7100->7099 7103 2c4ee0 7101->7103 7104 2c3998 RtlAllocateHeap 7103->7104 7105 2c4ef5 7104->7105 7106 2c4f22 18 API calls 7105->7106 7107 2c4f13 7105->7107 7106->7107

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 122 2ce743-2ce75d GetSystemInfo 123 2ce7a1-2ce7ea VirtualAlloc call 2cea8f 122->123 124 2ce763-2ce79b 122->124 128 2ce8d0-2ce8d5 call 2ce8d9 123->128 129 2ce7f0-2ce814 call 2cea8f 123->129 124->123 136 2ce8d7-2ce8d8 128->136 129->128 135 2ce81a-2ce83e call 2cea8f 129->135 135->128 139 2ce844-2ce868 call 2cea8f 135->139 139->128 142 2ce86e-2ce87b 139->142 143 2ce8a1-2ce8b8 call 2cea8f 142->143 144 2ce881-2ce89c 142->144 147 2ce8bd-2ce8bf 143->147 148 2ce8cb 144->148 147->128 149 2ce8c5 147->149 148->136 149->148
    APIs
    • GetSystemInfo.KERNELBASE(?,-121D5FEC), ref: 002CE74F
    • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004), ref: 002CE7B0
    Memory Dump Source
    • Source File: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: AllocInfoSystemVirtual
    • String ID:
    • API String ID: 3440192736-0
    • Opcode ID: e1c20014a43da9f19e340b8a463c238de31d6b6afbe1cbb222ad29cb95c5a2d7
    • Instruction ID: 6432b5eae379d0b526cc2b350adf8b5db6000b11c4b65d80f2293296d1bfb653
    • Opcode Fuzzy Hash: e1c20014a43da9f19e340b8a463c238de31d6b6afbe1cbb222ad29cb95c5a2d7
    • Instruction Fuzzy Hash: 79411FB1D14207AAD735CF60C946FAAB7ACFF08741F110566B607DA482E7B095E49BE0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 237 271e35-271e36 238 271e3e-271e5d 237->238 239 271e3c-271e3d 237->239 241 271e63-271e68 238->241 242 271e69-271e7a 238->242 239->238 241->242 244 271e80-271e8e 242->244 245 271e8f-271e93 242->245 244->245 247 271ea3-271ebe 245->247 248 271e99-271ea2 245->248 249 271ee5-271f3b CreateFileA 247->249 250 271ec4-271ee4 247->250 248->247 254 271f41-271f51 call 271f54 249->254 255 271fa0-271fb0 call 271fb3 249->255 250->249
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 7c323d4c8be39c5ed6ab44f206caf76ed14dbf9b238d855589831cf1d5e9890c
    • Instruction ID: 983f1ec8f38905f16c09d7f6ac2fbe4d470a00292e8e2f4bb8d3249b2e894738
    • Opcode Fuzzy Hash: 7c323d4c8be39c5ed6ab44f206caf76ed14dbf9b238d855589831cf1d5e9890c
    • Instruction Fuzzy Hash: 7411D2B76682157EF7018A299E41ABBB66CEF85730F30C026F809E7482C2F10D399624
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID:
    • String ID: !!iH
    • API String ID: 0-3430752988
    • Opcode ID: ec361a3c7ea55a2e0183ded48a7f7f75f9a43d2f4b9ddaf07c8cdcd96a207308
    • Instruction ID: 46eec6fd05855692609ca7869acfe90ed2ab149c050cf2bffba4b79b3dd66316
    • Opcode Fuzzy Hash: ec361a3c7ea55a2e0183ded48a7f7f75f9a43d2f4b9ddaf07c8cdcd96a207308
    • Instruction Fuzzy Hash: 25E08C3110848DCADF26DF60C9027F9364EDB80700F504615BB418AE4BCF6D0D12EB95

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 002C5040
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 002C5054
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: 5a0f94a27225cecdbcfb7c019dce45bfc42c419764bf9e87fff8f67285a1a4bc
    • Instruction ID: 9b2e90d427ecfac3c70b9677d3fb638ebd391ab7e5d95c488f040ebe8f3dc624
    • Opcode Fuzzy Hash: 5a0f94a27225cecdbcfb7c019dce45bfc42c419764bf9e87fff8f67285a1a4bc
    • Instruction Fuzzy Hash: EC31843242012AEFDF20AF50C814FAE7B75FF08310F10866EF80696561C770AAB0DBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 40 2c5435-2c5446 call 2c4d99 43 2c544c 40->43 44 2c5451-2c545a call 2c385c 40->44 46 2c54e5-2c54e9 43->46 50 2c548e-2c5495 44->50 51 2c5460-2c546c call 2c3f6e 44->51 48 2c54fd-2c5500 GetModuleHandleA 46->48 49 2c54ef-2c54f8 GetModuleHandleW 46->49 52 2c5506 48->52 49->52 55 2c549b-2c54a2 50->55 56 2c54e0 call 2c3907 50->56 57 2c5471-2c5473 51->57 54 2c5510-2c5512 52->54 55->56 58 2c54a8-2c54af 55->58 56->46 57->56 60 2c5479-2c547e 57->60 58->56 61 2c54b5-2c54bc 58->61 60->56 62 2c5484-2c550b call 2c3907 60->62 61->56 63 2c54c2-2c54d6 61->63 62->54 63->56
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,002C53C7,?,00000000,00000000), ref: 002C54F2
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,002C53C7,?,00000000,00000000), ref: 002C5500
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: 1397952cef5cd47be5437edab94e0fba82ca12b8865b8c868babcae18dc777e1
    • Instruction ID: a999df1b3b0b5e568ac7c2fc10c38fab11d5469e58362c93e395381ab7c1d97a
    • Opcode Fuzzy Hash: 1397952cef5cd47be5437edab94e0fba82ca12b8865b8c868babcae18dc777e1
    • Instruction Fuzzy Hash: 4A113030220A5BEAEF389F14C809FAA7A71BF0438AF40831DE415444A1D7F5E9F4DA91

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 67 2c3e0f-2c3e3f 69 2c3f6a-2c3f6b 67->69 70 2c3e45-2c3e5a 67->70 70->69 72 2c3e60-2c3e64 70->72 73 2c3e6a-2c3e7c PathAddExtensionA 72->73 74 2c3e86-2c3e8d 72->74 77 2c3e85 73->77 75 2c3eaf-2c3eb6 74->75 76 2c3e93-2c3ea2 call 2c3ab0 74->76 79 2c3ebc-2c3ec3 75->79 80 2c3ef8-2c3eff 75->80 83 2c3ea7-2c3ea9 76->83 77->74 84 2c3edc-2c3eeb call 2c3ab0 79->84 85 2c3ec9-2c3ed2 79->85 81 2c3f05-2c3f1b call 2c3ab0 80->81 82 2c3f21-2c3f28 80->82 81->69 81->82 87 2c3f2e-2c3f44 call 2c3ab0 82->87 88 2c3f4a-2c3f51 82->88 83->69 83->75 91 2c3ef0-2c3ef2 84->91 85->84 89 2c3ed8 85->89 87->69 87->88 88->69 94 2c3f57-2c3f64 call 2c3ae9 88->94 89->84 91->69 91->80 94->69
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 002C3E71
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: 31949444ae2f6219167ce34caee6ec2e53de963abdc698dd47a7cce75c39f6ef
    • Instruction ID: 47c1a70c2d2aee8b36da10a4fc965e00e64ad0f22870a16a37e1ff63cc4e5c29
    • Opcode Fuzzy Hash: 31949444ae2f6219167ce34caee6ec2e53de963abdc698dd47a7cce75c39f6ef
    • Instruction Fuzzy Hash: 0B314571A1120AFEEF21DF98C809FCEBA75BF08304F009A59FA00A54A0D7769A71DB54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 98 2c551e-2c5531 call 2c385c 101 2c5574-2c5588 call 2c3907 GetModuleHandleExA 98->101 102 2c5537-2c5543 call 2c3f6e 98->102 107 2c5592-2c5594 101->107 106 2c5548-2c554a 102->106 106->101 108 2c5550-2c5557 106->108 109 2c555d 108->109 110 2c5560-2c558d call 2c3907 108->110 109->110 110->107
    APIs
      • Part of subcall function 002C385C: GetCurrentThreadId.KERNEL32 ref: 002C386B
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 002C5582
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleThread
    • String ID: .dll
    • API String ID: 2752942033-2738580789
    • Opcode ID: dcfab8c2557723d2b651976dc55682be9a17073e117ae9a74f768d25d27fb232
    • Instruction ID: e64c6a20575c0ff17af05e6571afed565aad6a5d2ff54a897f11905f81a4d725
    • Opcode Fuzzy Hash: dcfab8c2557723d2b651976dc55682be9a17073e117ae9a74f768d25d27fb232
    • Instruction Fuzzy Hash: 87F01D72120609EFDF10DF64C945FAD3FB6BF08394F908619F90589152D771E9B09A51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 113 271f17-271f26 114 271f94-271f9a 113->114 115 271f28-271f3b CreateFileA 113->115 117 271fa0-271fb0 call 271fb3 114->117 116 271f41-271f51 call 271f54 115->116 115->117
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: m
    • API String ID: 823142352-3775001192
    • Opcode ID: 0098b7fa50ddb7a21a6a0fd69ba875276adb996b4b53becffe6f4c13db64863a
    • Instruction ID: 2e7ba5af48828a891b7ae9df9ae3d187f2e26c94b53566e20f7c1900b3ac13ac
    • Opcode Fuzzy Hash: 0098b7fa50ddb7a21a6a0fd69ba875276adb996b4b53becffe6f4c13db64863a
    • Instruction Fuzzy Hash: 0AF09735A5436A2EDB00AF38CC8039EBB20EF04310F5C8049D804E7E82C275AC30CB49

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 150 2ceae6-2ceaf1 151 2ceaf7-2ceb19 VirtualAlloc 150->151 152 2ceb20-2ceb2d 150->152 151->152 154 2ceb5e-2ceb60 152->154 155 2ceb33-2ceb3f 152->155 157 2ceb45-2ceb48 155->157 158 2ceb4e-2ceb51 157->158 159 2ceb56-2ceb5b 157->159 158->157 159->154
    APIs
    • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,?,,,002CEAE2,?,?,?,?,?,,,?,?,002CE7E8), ref: 002CEB06
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID: ,
    • API String ID: 4275171209-1222783184
    • Opcode ID: 0acd1ce5ec3562cf4ff517e5f011cb9daac21f4bbc4d1ee91f795d2a81623080
    • Instruction ID: 03ea01c36980c578c7e0869fdeabb77be6546b8acb2940686b69e6e7619bbad0
    • Opcode Fuzzy Hash: 0acd1ce5ec3562cf4ff517e5f011cb9daac21f4bbc4d1ee91f795d2a81623080
    • Instruction Fuzzy Hash: BBF08CB1904206EFDB258F04CE05F69BFA4FF49766F128068F54B9B291D3B198D0AF91

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 168 2cf16f-2cf17d 169 2cf1a0-2cf1aa call 2cf004 168->169 170 2cf183-2cf195 168->170 175 2cf1b5-2cf1be 169->175 176 2cf1b0 169->176 170->169 174 2cf19b 170->174 177 2cf2ff-2cf301 174->177 178 2cf1c4-2cf1cb 175->178 179 2cf1d6-2cf1dd 175->179 176->177 178->179 180 2cf1d1 178->180 181 2cf1e8-2cf1f8 179->181 182 2cf1e3 179->182 180->177 181->177 183 2cf1fe-2cf20a call 2cf0d9 181->183 182->177 186 2cf20d-2cf211 183->186 186->177 187 2cf217-2cf221 186->187 188 2cf248-2cf24b 187->188 189 2cf227-2cf23a 187->189 190 2cf24e-2cf251 188->190 189->188 196 2cf240-2cf242 189->196 191 2cf2f7-2cf2fa 190->191 192 2cf257-2cf25e 190->192 191->186 194 2cf28c-2cf2a5 192->194 195 2cf264-2cf26a 192->195 202 2cf2be-2cf2c6 VirtualProtect 194->202 203 2cf2ab-2cf2b9 194->203 197 2cf287 195->197 198 2cf270-2cf275 195->198 196->188 196->191 200 2cf2ef-2cf2f2 197->200 198->197 199 2cf27b-2cf281 198->199 199->194 199->197 200->190 204 2cf2cc-2cf2cf 202->204 203->204 204->200 206 2cf2d5-2cf2ee 204->206 206->200
    Memory Dump Source
    • Source File: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3259270ac7e613a2ff795961021089bcde03c973af59650afac39ced79e53bd8
    • Instruction ID: bab5cdba830307504f39ee95f771576c8afb2de5699a9e2a895efb5b49732523
    • Opcode Fuzzy Hash: 3259270ac7e613a2ff795961021089bcde03c973af59650afac39ced79e53bd8
    • Instruction Fuzzy Hash: E741A176920206EFDB74DF54CA44FAE7BB2FF04314F244269ED02AA151D3B1ADA0DB52

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 208 26f8f1-26f8f3 LoadLibraryA 209 26f90b-26fa30 208->209
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 71b395e2be09135b1f49d251701ba910630f6f144e42278690b440f486dc0e8b
    • Instruction ID: 0495c2c6d0eb506b478cf1bc169258c5b6ef37cfc339c0821e0f23a0d1212eaa
    • Opcode Fuzzy Hash: 71b395e2be09135b1f49d251701ba910630f6f144e42278690b440f486dc0e8b
    • Instruction Fuzzy Hash: 6831E0B251C600AFE706AF19D88167AFBF9FF98310F124C2DE2C582610D73188908B9B

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 210 2c57b2-2c57c1 call 2c393a 213 2c58c7 210->213 214 2c57c7-2c57d8 call 2c5778 210->214 215 2c58ce-2c58d2 213->215 218 2c57de-2c57e2 214->218 219 2c57f8-2c583e CreateFileA 214->219 222 2c57e8-2c57f4 call 2ca800 218->222 223 2c57f5 218->223 220 2c5889-2c588c 219->220 221 2c5844-2c5865 219->221 224 2c58bf-2c58c2 call 2c5607 220->224 225 2c5892-2c58a9 call 2c367c 220->225 221->220 231 2c586b-2c5888 221->231 222->223 223->219 224->213 225->215 233 2c58af-2c58ba call 2c5675 225->233 231->220 233->213
    APIs
      • Part of subcall function 002C393A: RtlAllocateHeap.NTDLL(00000000,00000000,002C35E3,?,?,002C35E3,00000008), ref: 002C3954
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 002C5834
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: AllocateCreateFileHeap
    • String ID:
    • API String ID: 3125202945-0
    • Opcode ID: 31cea50cfcc3392280e3510dcf75e8e027f402dacdf5c0ca4c976bac7aae0ea7
    • Instruction ID: 2332f2e974b939988d5502601ffe8a22f20863aec50cd1c11f292d3ead702025
    • Opcode Fuzzy Hash: 31cea50cfcc3392280e3510dcf75e8e027f402dacdf5c0ca4c976bac7aae0ea7
    • Instruction Fuzzy Hash: 13318271950605BAEB209F64DC45F99BBB8AB04728F208369F610AA1D1C3B5F5E28B54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 260 271e45-271e52 261 271e54-271e5d 260->261 262 271ddb-271dec 260->262 265 271e63-271e68 261->265 266 271e69-271e7a 261->266 267 271df2 262->267 268 271ded call 271df5 262->268 265->266 270 271e80-271e8e 266->270 271 271e8f-271e93 266->271 268->267 270->271 273 271ea3-271ebe 271->273 274 271e99-271ea2 271->274 275 271ee5-271f3b CreateFileA 273->275 276 271ec4-271ee4 273->276 274->273 280 271f41-271f51 call 271f54 275->280 281 271fa0-271fb0 call 271fb3 275->281 276->275
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 4a5031f43d7b22a72727b8e74c170bdae96325b6632502633b88e4b3a5e70cf4
    • Instruction ID: db5da27059b55cf7e071f407d66a3317718cfe17142b57f896f787baa23dc4f4
    • Opcode Fuzzy Hash: 4a5031f43d7b22a72727b8e74c170bdae96325b6632502633b88e4b3a5e70cf4
    • Instruction Fuzzy Hash: 6211C6B75682416EF7118E299E01BBA7768DF82734F308025F909D7582D2F14D399A64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 286 271e29-271e5d call 271e35 291 271e63-271e68 286->291 292 271e69-271e7a 286->292 291->292 294 271e80-271e8e 292->294 295 271e8f-271e93 292->295 294->295 297 271ea3-271ebe 295->297 298 271e99-271ea2 295->298 299 271ee5-271f3b CreateFileA 297->299 300 271ec4-271ee4 297->300 298->297 304 271f41-271f51 call 271f54 299->304 305 271fa0-271fb0 call 271fb3 299->305 300->299
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: c2dc7c17e8e9390b97a3f1eba5292e529dd2f274c00e2e233c2911e5ff39b12e
    • Instruction ID: 71184f0dd92d74b7c52ed6a0fe35def65eeb51293aa4a8d078acc463854b59b1
    • Opcode Fuzzy Hash: c2dc7c17e8e9390b97a3f1eba5292e529dd2f274c00e2e233c2911e5ff39b12e
    • Instruction Fuzzy Hash: FC1105B752C2416EF3028A199D01BBBBB68DF82330F31C066F809D7482D2F10D399665

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 310 271e6f-271e7a 312 271e80-271e8e 310->312 313 271e8f-271e93 310->313 312->313 315 271ea3-271ebe 313->315 316 271e99-271ea2 313->316 317 271ee5-271f3b CreateFileA 315->317 318 271ec4-271ee4 315->318 316->315 322 271f41-271f51 call 271f54 317->322 323 271fa0-271fb0 call 271fb3 317->323 318->317
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 98c620be7877a6855d9e03a5026bf7e4cbbccb88cd47077687639c3ddf4999fe
    • Instruction ID: b1c879b8324a60459ab4403e7112c358284099a417ccdee833454619b3ba5d4b
    • Opcode Fuzzy Hash: 98c620be7877a6855d9e03a5026bf7e4cbbccb88cd47077687639c3ddf4999fe
    • Instruction Fuzzy Hash: 430104B76682417EE701CE189E05ABF7668EF82730F308026F809DB582D2F10D399664
    APIs
    • GetModuleFileNameA.KERNELBASE(?,?,0000028A,?,?), ref: 002CEF69
    Memory Dump Source
    • Source File: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID:
    • API String ID: 514040917-0
    • Opcode ID: 096a355674c187886897c7e75656f6234e6b6409770dd1bda0ab94d43179b88a
    • Instruction ID: 4d79fad64ec747adac6d783024031d92bc76ad09594eb67353619fc1471a2809
    • Opcode Fuzzy Hash: 096a355674c187886897c7e75656f6234e6b6409770dd1bda0ab94d43179b88a
    • Instruction Fuzzy Hash: C1119671A2122A9FFF204E048C48FAABB6CAF54751F1242ADF945A6481D7789D90CAA1
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04E20DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1564600417.0000000004E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4e20000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: eefe25c8160013e10a942afade6a277ca1dee304bb3637e60ef064f90d7ae2ff
    • Instruction ID: 28f0e0dffa92c9465d659ccc06d4963c05343e17e99f463bb9e7c236b2427df1
    • Opcode Fuzzy Hash: eefe25c8160013e10a942afade6a277ca1dee304bb3637e60ef064f90d7ae2ff
    • Instruction Fuzzy Hash: 742104B69012198FDB54CF99D984ADEBBB1FB88320F14862AD908AB244C774A545CBA4
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04E20DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1564600417.0000000004E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4e20000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 944e25f775c7f60dace7fc0dec5b771ee6a1ae9cfa6e13c8e6c4e0dd2fe0e27c
    • Instruction ID: 5aabcbf1f2a6b9f09da1cfc8b795915666740727607b706e622aa69b3fd3a93f
    • Opcode Fuzzy Hash: 944e25f775c7f60dace7fc0dec5b771ee6a1ae9cfa6e13c8e6c4e0dd2fe0e27c
    • Instruction Fuzzy Hash: 3B2135B6C012199FCB10CF9AD984BDEFBF4FB88710F14811AD908AB244C774A540CBA4
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 3c93d189c7ed6324a49ab0656c0dd655cb9529217878e378bda97de3ea2eab36
    • Instruction ID: a38ad9413b9674ed06d442abacb4826f64bf011c0cf3a9ba3cb2eba7de275923
    • Opcode Fuzzy Hash: 3c93d189c7ed6324a49ab0656c0dd655cb9529217878e378bda97de3ea2eab36
    • Instruction Fuzzy Hash: C101D8B75692456FE710CE289D51BBF766CDF80724F318029F814DB581C2F10D39CA65
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04E21580
    Memory Dump Source
    • Source File: 00000000.00000002.1564600417.0000000004E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4e20000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 1949a9fccec04648aa4d24029883d4d801484241aa3c878cf36af88667890fe5
    • Instruction ID: c13435d8b91fa925f6e5ff845ae15c4c4a6ec094ecf960ec4560be7344863512
    • Opcode Fuzzy Hash: 1949a9fccec04648aa4d24029883d4d801484241aa3c878cf36af88667890fe5
    • Instruction Fuzzy Hash: 0C11D3B1D003499FDB10CF9AD984BDEFBF4EB48320F10802AE559A3250D778AA44CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04E21580
    Memory Dump Source
    • Source File: 00000000.00000002.1564600417.0000000004E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4e20000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 968e2658b03821b38c06c891b31a1721d185fc4136ed2ad5b1eab2fbd950d1ed
    • Instruction ID: dfa766d1e9ab02d8f78a45b9e358153620a93f8c5854ffa47b3abf46bb1ea67d
    • Opcode Fuzzy Hash: 968e2658b03821b38c06c891b31a1721d185fc4136ed2ad5b1eab2fbd950d1ed
    • Instruction Fuzzy Hash: 7611FFB5D0024A8FDB10CF9AD584B9EFBF4AB48320F10802AE519A3250C778AA44CFA5
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: ae202fc794aff39946fb85b82ae0be80561cf8db7d97dbb8dead2f5bd6cc9468
    • Instruction ID: 7ab9be13c7faf536cb50e13091d6c5baaa201162bcaa9cb7b63adeb9669e88ff
    • Opcode Fuzzy Hash: ae202fc794aff39946fb85b82ae0be80561cf8db7d97dbb8dead2f5bd6cc9468
    • Instruction Fuzzy Hash: C7016876968246AFE710CF288840BAF7766DF48310F25802EE9198B881C2F04C35C798
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04E21367
    Memory Dump Source
    • Source File: 00000000.00000002.1564600417.0000000004E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4e20000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 27a1aac00bcca64ceb36c218d3ceedaa9686c9f479c8d8bc8366ea6060b8bddc
    • Instruction ID: 946aade832224a7abdcbf83bfaa3e4a82c2d20ce438584b8c65ba1a3cad82e01
    • Opcode Fuzzy Hash: 27a1aac00bcca64ceb36c218d3ceedaa9686c9f479c8d8bc8366ea6060b8bddc
    • Instruction Fuzzy Hash: 661102B18003498FDB10DFAAD985BEEBBF4EB48320F24842AD558A3650D778A545CBA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04E21367
    Memory Dump Source
    • Source File: 00000000.00000002.1564600417.0000000004E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4e20000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: e64d303da8929d294a5af4285af967ad66ce357e8d3c0b8937dea0529891577c
    • Instruction ID: bc6c2273baba2a98d11ecb45b53a2fd2675323276595fda7a12f98f87df4ff8d
    • Opcode Fuzzy Hash: e64d303da8929d294a5af4285af967ad66ce357e8d3c0b8937dea0529891577c
    • Instruction Fuzzy Hash: A91136B1800349CFDB10CF9AC945BEEFBF4EB48320F20841AD558A3640C778A544CFA5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: e36f8f3477b62e76d966d540b6c71672f18b1df18b9506f614b240355ce5a852
    • Instruction ID: 21d2f9dee593bd320961fea04d5bf8a390e3286a763f316d98d5c0a4d25d391c
    • Opcode Fuzzy Hash: e36f8f3477b62e76d966d540b6c71672f18b1df18b9506f614b240355ce5a852
    • Instruction Fuzzy Hash: 2FF0147211C600CBD7097F68D89507EBBE0EF48711F125C1DD6C6832A4DA3514A0CA43
    APIs
    • CreateFileA.KERNELBASE(?,000000C1), ref: 00271DBF
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 5f5dbc7ecc5d26f058d9e80e1064f160423d6b036bde67672892d560d94e5ded
    • Instruction ID: 47b4412c556e0bc6ce5b1dc3e4a141997704505de81023232407a41d66d4f4a4
    • Opcode Fuzzy Hash: 5f5dbc7ecc5d26f058d9e80e1064f160423d6b036bde67672892d560d94e5ded
    • Instruction Fuzzy Hash: 1FE0E5B1C783616EE7B0AF3C0C80B7939989F11365F10866AE459C65C1D2B00C308F19
    APIs
    • CreateFileA.KERNELBASE(?,D8E95884,00000003,00000000,00000003,00271E31,00000000), ref: 00271F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: a7853494030ac9a6526e1351fd86598e59efa1d74d015d79067cbe974b883a4b
    • Instruction ID: 313df2a955865359fe09b0e111a25dd64e4a92d28c6bf5aace87dd7b45419ad3
    • Opcode Fuzzy Hash: a7853494030ac9a6526e1351fd86598e59efa1d74d015d79067cbe974b883a4b
    • Instruction Fuzzy Hash: 39E0C276AA82762ECB018E7C9C41A6E3398DF88300F64C029E819E7994D271EC2B4619
    APIs
    • RtlAllocateHeap.NTDLL(00000000,00000000,002C35E3,?,?,002C35E3,00000008), ref: 002C3954
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: c02c35135862cb9c5074f85ca712dd232e5ecccd51728bac8ca538e502e882b0
    • Instruction ID: 60c2295411c6754756c76e88dda63587c0afd203907e328df4b6c623d7f24b3b
    • Opcode Fuzzy Hash: c02c35135862cb9c5074f85ca712dd232e5ecccd51728bac8ca538e502e882b0
    • Instruction Fuzzy Hash: 5BD0C977201606B7DE205E6EDC09F9ABA6CAB8AB94F004625B60194080DB65E1A1C5A4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 2f0bc2708865bcf9330ce92d0045f8857b3bd5671d72bb61b45baf8e14230068
    • Instruction ID: d72a750c5340795699379e35f431922d8a34571ef36416fa908db554c5bfc455
    • Opcode Fuzzy Hash: 2f0bc2708865bcf9330ce92d0045f8857b3bd5671d72bb61b45baf8e14230068
    • Instruction Fuzzy Hash: 7A01C032A1010ABEDF21EFA8CC04E9EBBB6EF48740F008669F401A4060D7328A71DE60
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 000FE710
    Memory Dump Source
    • Source File: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 777b4bd00ec4490d298f7677203d7f2870c2ed974750dfa9a88424b2edadbab6
    • Instruction ID: 709976a34f6d5739c4aea9267e3dec1d97c549f1f7414d713c389df6267a66ba
    • Opcode Fuzzy Hash: 777b4bd00ec4490d298f7677203d7f2870c2ed974750dfa9a88424b2edadbab6
    • Instruction Fuzzy Hash: ABD067B440C649CBD7146F6480452BDBBA0EB14302F11055CDAC246A50E2321860DA47
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 000FEE4F
    Memory Dump Source
    • Source File: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 91496cceac90b5597e28bb4b82aa9aea4f853a0111c9343bdac7299d702b1aa2
    • Instruction ID: a9a735c33e996e13019ac968d83eab82f458886e79366a38e4481c57f7a1dc4d
    • Opcode Fuzzy Hash: 91496cceac90b5597e28bb4b82aa9aea4f853a0111c9343bdac7299d702b1aa2
    • Instruction Fuzzy Hash: 56D0C97080424E8BCB181F74800C2AD3A60FF05322F200205FC21C2AC0C6310C50DA1A
    APIs
    • CloseHandle.KERNELBASE(?,?,002C36FB,?,?), ref: 002C567B
    Memory Dump Source
    • Source File: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 5a9b30a076f8f44484ca61db8c6e1d6f9cbf22647893a4980216e68756d54c51
    • Instruction ID: 0b176080322ff9995b4112d527bcb270a96c0e5b1f29e596b14311031f853680
    • Opcode Fuzzy Hash: 5a9b30a076f8f44484ca61db8c6e1d6f9cbf22647893a4980216e68756d54c51
    • Instruction Fuzzy Hash: F4B04831000608BBCB01AF55D806849BF69AFA5298B50C224B905844218B76EAA19AD5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID:
    • String ID: NTDL
    • API String ID: 0-3662016964
    • Opcode ID: 141a006a37b17783932c8410ddd6d0aa1e8a30b080feed4379427b0ce380aa98
    • Instruction ID: 848948d590e1febe8a5a1b8fbab143501ad918ee2725b42bc05c0e6395383fff
    • Opcode Fuzzy Hash: 141a006a37b17783932c8410ddd6d0aa1e8a30b080feed4379427b0ce380aa98
    • Instruction Fuzzy Hash: 7871C0B290821E8FDB55CF64C4511FF7BE2FB46321F24422BDA4187E02D2B24D11EB9A
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2bcc5b76cc59f171d8b5db5117abf16fe22683a24072b30b589e6a6d2868fef5
    • Instruction ID: 36d860a48c23e73ef178378b9bb7ca59cf79d28562ca72381677990efb0cac56
    • Opcode Fuzzy Hash: 2bcc5b76cc59f171d8b5db5117abf16fe22683a24072b30b589e6a6d2868fef5
    • Instruction Fuzzy Hash: 35C10F7241D7C19FCB029F34DD652A9FFB0BF66210F188AAEC4C18B556E364549ACB42
    Memory Dump Source
    • Source File: 00000000.00000002.1562681392.000000000026C000.00000040.00000001.01000000.00000003.sdmp, Offset: 000F0000, based on PE: true
    • Associated: 00000000.00000002.1562449481.00000000000F0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562469049.00000000000F2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562483960.00000000000F6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562499804.00000000000FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562515952.0000000000104000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562530149.0000000000105000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562544336.0000000000106000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562647148.0000000000259000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562663956.000000000025C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562681392.0000000000279000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562712344.0000000000282000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562726619.0000000000284000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562741892.000000000028D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562760804.0000000000294000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562781546.00000000002A9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562803602.00000000002BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562820149.00000000002C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562835604.00000000002CA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562852023.00000000002D9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562867138.00000000002E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562881669.00000000002E9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562898683.00000000002EE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562913485.00000000002F5000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562927710.00000000002F7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562943555.00000000002FF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562957896.0000000000302000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562976705.0000000000309000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1562992523.000000000030E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563007495.0000000000314000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563024361.0000000000317000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563039358.0000000000318000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563057627.0000000000321000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563098222.0000000000381000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563115135.0000000000382000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.0000000000383000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563130926.000000000038A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1563166730.000000000039A000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b9743ab00ebdbcbeb3e52963f8387a1bea7c3fdd4f8fceee64be1277cea0b70d
    • Instruction ID: 7ca8cdaf3c82a1a3eac3b87f2775f793a759de26af063498b8433dd9b2e681b5
    • Opcode Fuzzy Hash: b9743ab00ebdbcbeb3e52963f8387a1bea7c3fdd4f8fceee64be1277cea0b70d
    • Instruction Fuzzy Hash: 773118F211C700AFE305AF09D881ABAFBE9FF95320F56482DE6C583610D37549948B67