Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1560142
MD5:21f1d579996c0e223529d781d9390c05
SHA1:db238f2cc489e22158603b17a49e6fd43b314d74
SHA256:64a5b57d555ef999a209a254c0324edd6f03832ee9f688444e101f526662c5b3
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SIDT)
Contains long sleeps (>= 3 min)
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7812 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 21F1D579996C0E223529D781D9390C05)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F87A3 CryptVerifySignatureA,0_2_005F87A3
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1387296911.0000000004CB0000.00000004.00001000.00020000.00000000.sdmp
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: time.windows.com

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: String function: 005F3798 appears 35 times
Source: file.exe, 00000000.00000000.1365810028.0000000000426000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@1/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: file.exeString found in binary or memory: RtlAllocateHeap3Cannot find '%s'. Please, re-install this applicationThunRTMain__vbaVarTstNeR
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2754048 > 1048576
Source: file.exeStatic PE information: Raw size of ybikrwjp is bigger than: 0x100000 < 0x29a600
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1387296911.0000000004CB0000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.420000.0.unpack :EW;.rsrc:W;.idata :W;ybikrwjp:EW;qvqhdqdc:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2af6c7 should be: 0x2ae4f4
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: ybikrwjp
Source: file.exeStatic PE information: section name: qvqhdqdc
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00430220 push edi; mov dword ptr [esp], ebx0_2_00430C6B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00430220 push 0DD450D8h; mov dword ptr [esp], edi0_2_00430C9A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042E4FE push eax; mov dword ptr [esp], 298178C6h0_2_0042F2C5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B804A push 43847944h; mov dword ptr [esp], edx0_2_005B804F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B804A push 27247599h; mov dword ptr [esp], edi0_2_005B8057
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005A2047 push ebx; mov dword ptr [esp], ebp0_2_005A206F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005A2047 push eax; mov dword ptr [esp], 6ECFE75Eh0_2_005A20CE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005A2047 push 7D367841h; mov dword ptr [esp], ebp0_2_005A2142
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00638059 push ecx; mov dword ptr [esp], ebx0_2_00638092
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00431006 push 5436E24Ah; mov dword ptr [esp], eax0_2_0043101B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00431006 push ecx; mov dword ptr [esp], eax0_2_0043326F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042C00B push ebx; mov dword ptr [esp], eax0_2_0042C015
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005AD0E9 push eax; mov dword ptr [esp], ebx0_2_005AD0EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004310F5 push 0836D071h; mov dword ptr [esp], ebx0_2_004310FD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B30D6 push 092401B7h; mov dword ptr [esp], esi0_2_006B3118
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B30D6 push eax; mov dword ptr [esp], ebp0_2_006B3197
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B30D6 push eax; mov dword ptr [esp], esp0_2_006B319B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042F08A push 316B617Eh; mov dword ptr [esp], eax0_2_0042F0AA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005AF08C push esi; mov dword ptr [esp], eax0_2_005AF08D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004330B2 push ebx; mov dword ptr [esp], ecx0_2_004330C1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005AF0A4 push ebp; mov dword ptr [esp], edx0_2_005AF0A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005AF0A4 push edi; mov dword ptr [esp], eax0_2_005AF0AD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043114A push ecx; mov dword ptr [esp], edx0_2_00431F92
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042C14D push 57116CCBh; mov dword ptr [esp], esi0_2_0042C6F4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042D155 push eax; mov dword ptr [esp], edi0_2_0042D165
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B8119 push esi; mov dword ptr [esp], ebx0_2_005B82B1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B0118 push edx; mov dword ptr [esp], ebp0_2_005B0127
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B0118 push ecx; mov dword ptr [esp], ebx0_2_005B013F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00431105 push 3537E9C3h; mov dword ptr [esp], ecx0_2_00433A9F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042D132 push 63516AAFh; mov dword ptr [esp], edi0_2_0042D137
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B612B push 52D01FEAh; mov dword ptr [esp], ebp0_2_005B6132
Source: file.exeStatic PE information: section name: entropy: 7.765265667159949

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 42E27C second address: 42E280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 42E280 second address: 42E286 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1C67 second address: 5A1C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F3BD4C9CF8Bh 0x0000000d pop esi 0x0000000e jo 00007F3BD4C9CF8Eh 0x00000014 push edi 0x00000015 pop edi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1C85 second address: 5A1CA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F3BD4DEAE59h 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1E03 second address: 5A1E70 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF97h 0x00000007 jmp 00007F3BD4C9CF92h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jo 00007F3BD4C9CF86h 0x00000015 jmp 00007F3BD4C9CF99h 0x0000001a jmp 00007F3BD4C9CF93h 0x0000001f jmp 00007F3BD4C9CF8Ch 0x00000024 popad 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1E70 second address: 5A1E93 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F3BD4DEAE55h 0x00000008 pushad 0x00000009 popad 0x0000000a pop esi 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1E93 second address: 5A1E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1E97 second address: 5A1EC9 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F3BD4DEAE46h 0x00000008 jmp 00007F3BD4DEAE53h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007F3BD4DEAE4Fh 0x00000015 pushad 0x00000016 popad 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1EC9 second address: 5A1ED9 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3BD4C9CF8Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1ED9 second address: 5A1EDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1EDF second address: 5A1EE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A21CB second address: 5A21DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007F3BD4DEAE46h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A21DA second address: 5A21E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A21E0 second address: 5A21E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A21E8 second address: 5A220E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F3BD4C9CF8Bh 0x00000010 jmp 00007F3BD4C9CF8Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A220E second address: 5A2214 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A2214 second address: 5A2219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A2219 second address: 5A2222 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A23A4 second address: 5A23A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A23A8 second address: 5A23B0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A23B0 second address: 5A23BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3BD4C9CF8Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A23BF second address: 5A23C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A23C3 second address: 5A23FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F3BD4C9CF91h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jns 00007F3BD4C9CF8Eh 0x00000017 jbe 00007F3BD4C9CF8Eh 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A254D second address: 5A2560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4DEAE4Fh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A2560 second address: 5A2564 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A51DD second address: 5A51EB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007F3BD4DEAE46h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A51EB second address: 5A526A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF95h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a add dword ptr [esp], 3E5EEE91h 0x00000011 mov edx, dword ptr [ebp+122D2DCDh] 0x00000017 mov dword ptr [ebp+122D22D3h], ebx 0x0000001d push 00000003h 0x0000001f mov edx, dword ptr [ebp+122D2A81h] 0x00000025 push 00000000h 0x00000027 mov ecx, dword ptr [ebp+122D2AADh] 0x0000002d push ebx 0x0000002e mov ecx, 2CDA6C51h 0x00000033 pop esi 0x00000034 push 00000003h 0x00000036 push 00000000h 0x00000038 push edi 0x00000039 call 00007F3BD4C9CF88h 0x0000003e pop edi 0x0000003f mov dword ptr [esp+04h], edi 0x00000043 add dword ptr [esp+04h], 00000016h 0x0000004b inc edi 0x0000004c push edi 0x0000004d ret 0x0000004e pop edi 0x0000004f ret 0x00000050 mov esi, dword ptr [ebp+122D1CC8h] 0x00000056 push 79CE04ACh 0x0000005b push eax 0x0000005c push edx 0x0000005d pushad 0x0000005e je 00007F3BD4C9CF86h 0x00000064 jc 00007F3BD4C9CF86h 0x0000006a popad 0x0000006b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A526A second address: 5A529A instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3BD4DEAE4Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 4631FB54h 0x00000011 lea ebx, dword ptr [ebp+1244B068h] 0x00000017 mov cx, dx 0x0000001a xchg eax, ebx 0x0000001b push ecx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F3BD4DEAE4Ch 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A529A second address: 5A52B6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F3BD4C9CF92h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5321 second address: 5A5325 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5325 second address: 5A533E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F3BD4C9CF8Ch 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A533E second address: 5A538F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE59h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a add edi, dword ptr [ebp+122D2AE1h] 0x00000010 push 00000000h 0x00000012 mov ecx, dword ptr [ebp+122D37EDh] 0x00000018 push FC4B96A1h 0x0000001d pushad 0x0000001e jnl 00007F3BD4DEAE57h 0x00000024 push eax 0x00000025 push edx 0x00000026 jg 00007F3BD4DEAE46h 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A538F second address: 5A5393 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5393 second address: 5A53D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 add dword ptr [esp], 03B469DFh 0x0000000e mov esi, 2EA292CCh 0x00000013 push 00000003h 0x00000015 push esi 0x00000016 mov dword ptr [ebp+122D1E19h], edi 0x0000001c pop esi 0x0000001d push 00000000h 0x0000001f movsx ecx, si 0x00000022 push 00000003h 0x00000024 push eax 0x00000025 cmc 0x00000026 pop ecx 0x00000027 push A369A11Dh 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F3BD4DEAE57h 0x00000034 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A53D9 second address: 5A5411 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnc 00007F3BD4C9CF86h 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 popad 0x00000011 add dword ptr [esp], 1C965EE3h 0x00000018 xor edi, dword ptr [ebp+122D2B75h] 0x0000001e lea ebx, dword ptr [ebp+1244B071h] 0x00000024 jno 00007F3BD4C9CF8Bh 0x0000002a mov di, ax 0x0000002d push eax 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C61BF second address: 5C61C4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59875C second address: 598762 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C43C8 second address: 5C440C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F3BD4DEAE46h 0x00000009 jmp 00007F3BD4DEAE56h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 jnp 00007F3BD4DEAE4Ch 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F3BD4DEAE52h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C440C second address: 5C4427 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F3BD4C9CF88h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F3BD4C9CF8Fh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C49EE second address: 5C49FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 jnp 00007F3BD4DEAE46h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C4B5C second address: 5C4B66 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3BD4C9CF8Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C4FD5 second address: 5C4FDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C4FDB second address: 5C4FE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C4FE1 second address: 5C4FFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F3BD4DEAE51h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C525D second address: 5C5261 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C5261 second address: 5C527F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 jmp 00007F3BD4DEAE53h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C5BA8 second address: 5C5BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C5BAF second address: 5C5BB4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C5FDE second address: 5C5FF8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F3BD4C9CF92h 0x00000012 ja 00007F3BD4C9CF86h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C5FF8 second address: 5C5FFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CB98A second address: 5CB98E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CBF61 second address: 5CBF65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CBF65 second address: 5CBF76 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CBF76 second address: 5CBF89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CBF89 second address: 5CBF8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CBF8D second address: 5CBF91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CBF91 second address: 5CBFA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CAE6E second address: 5CAE83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3BD4DEAE51h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D2708 second address: 5D2729 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3BD4C9CF97h 0x00000009 jng 00007F3BD4C9CF86h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D2729 second address: 5D2753 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Ah 0x00000007 jmp 00007F3BD4DEAE54h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jc 00007F3BD4DEAE56h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D1C13 second address: 5D1C3A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3BD4C9CF9Ah 0x00000008 jmp 00007F3BD4C9CF92h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 jnl 00007F3BD4C9CF86h 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D1D61 second address: 5D1D70 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3BD4DEAE4Ah 0x00000008 push edx 0x00000009 pop edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D1D70 second address: 5D1D78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D1D78 second address: 5D1DA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F3BD4DEAE46h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F3BD4DEAE59h 0x00000014 pushad 0x00000015 push edi 0x00000016 pop edi 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D1DA5 second address: 5D1DB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F3BD4C9CF86h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D244D second address: 5D2453 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D2453 second address: 5D246A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F3BD4C9CF91h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D25C5 second address: 5D25C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D25C9 second address: 5D25D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D2E7E second address: 5D2E84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D3696 second address: 5D36A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF8Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D36A9 second address: 5D36B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F3BD4DEAE46h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D36B3 second address: 5D36B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D3D73 second address: 5D3D8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE52h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D3D8F second address: 5D3DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4C9CF98h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4F64 second address: 5D4F74 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4F74 second address: 5D4F7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F3BD4C9CF86h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4E57 second address: 5D4E69 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F3BD4DEAE48h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4E69 second address: 5D4E6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4E6D second address: 5D4E77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D5F47 second address: 5D5F4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4E77 second address: 5D4E7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D5F4B second address: 5D5F64 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F3BD4C9CF8Fh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4E7B second address: 5D4E7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D670C second address: 5D6712 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D83DD second address: 5D83ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F3BD4DEAE46h 0x0000000a jo 00007F3BD4DEAE46h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D83ED second address: 5D83FF instructions: 0x00000000 rdtsc 0x00000002 jo 00007F3BD4C9CF86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007F3BD4C9CF8Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D9F8A second address: 5D9FA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jc 00007F3BD4DEAE46h 0x0000000f jp 00007F3BD4DEAE46h 0x00000015 popad 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DAAFA second address: 5DAB0B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push edi 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA811 second address: 5DA817 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DAB0B second address: 5DAB0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DEF6D second address: 5DEF74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DEF74 second address: 5DEFD4 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F3BD4C9CF88h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edi 0x00000010 call 00007F3BD4C9CF88h 0x00000015 pop edi 0x00000016 mov dword ptr [esp+04h], edi 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc edi 0x00000023 push edi 0x00000024 ret 0x00000025 pop edi 0x00000026 ret 0x00000027 push ecx 0x00000028 pushad 0x00000029 mov dword ptr [ebp+1245D920h], edx 0x0000002f mov edx, dword ptr [ebp+12475FEBh] 0x00000035 popad 0x00000036 pop edi 0x00000037 push 00000000h 0x00000039 mov dword ptr [ebp+122D226Bh], edx 0x0000003f push 00000000h 0x00000041 jmp 00007F3BD4C9CF8Ch 0x00000046 push eax 0x00000047 push eax 0x00000048 push edx 0x00000049 pushad 0x0000004a jo 00007F3BD4C9CF86h 0x00000050 pushad 0x00000051 popad 0x00000052 popad 0x00000053 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E0FCF second address: 5E0FE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F3BD4DEAE4Eh 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E0137 second address: 5E013B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E0FE6 second address: 5E103B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE53h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a sub dword ptr [ebp+122D38A6h], ecx 0x00000010 mov edi, dword ptr [ebp+122DB612h] 0x00000016 push 00000000h 0x00000018 mov bl, 6Eh 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push edx 0x0000001f call 00007F3BD4DEAE48h 0x00000024 pop edx 0x00000025 mov dword ptr [esp+04h], edx 0x00000029 add dword ptr [esp+04h], 00000018h 0x00000031 inc edx 0x00000032 push edx 0x00000033 ret 0x00000034 pop edx 0x00000035 ret 0x00000036 xchg eax, esi 0x00000037 push eax 0x00000038 push edx 0x00000039 jo 00007F3BD4DEAE4Ch 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E103B second address: 5E103F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E013B second address: 5E0150 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE51h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E103F second address: 5E105A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnl 00007F3BD4C9CF86h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jng 00007F3BD4C9CF8Ch 0x00000015 jnp 00007F3BD4C9CF86h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E0150 second address: 5E0156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E105A second address: 5E1060 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E1060 second address: 5E1064 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E1222 second address: 5E124C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF8Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F3BD4C9CF95h 0x0000000e popad 0x0000000f push eax 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E331E second address: 5E3330 instructions: 0x00000000 rdtsc 0x00000002 je 00007F3BD4DEAE46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007F3BD4DEAE4Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E628B second address: 5E629D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 js 00007F3BD4C9CF94h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E629D second address: 5E62A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E5314 second address: 5E532C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF94h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E532C second address: 5E5331 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E5331 second address: 5E5341 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E5341 second address: 5E53D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3BD4DEAE51h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push ebx 0x0000000f call 00007F3BD4DEAE4Bh 0x00000014 mov edi, 2372554Bh 0x00000019 pop edi 0x0000001a pop ebx 0x0000001b push dword ptr fs:[00000000h] 0x00000022 push 00000000h 0x00000024 push edx 0x00000025 call 00007F3BD4DEAE48h 0x0000002a pop edx 0x0000002b mov dword ptr [esp+04h], edx 0x0000002f add dword ptr [esp+04h], 00000018h 0x00000037 inc edx 0x00000038 push edx 0x00000039 ret 0x0000003a pop edx 0x0000003b ret 0x0000003c mov edi, dword ptr [ebp+122D2CF9h] 0x00000042 mov dword ptr fs:[00000000h], esp 0x00000049 push esi 0x0000004a xor dword ptr [ebp+122D1CAAh], edx 0x00000050 pop edi 0x00000051 mov eax, dword ptr [ebp+122D0DA1h] 0x00000057 or edi, dword ptr [ebp+1246EBFBh] 0x0000005d push FFFFFFFFh 0x0000005f mov edi, edx 0x00000061 nop 0x00000062 jmp 00007F3BD4DEAE54h 0x00000067 push eax 0x00000068 push eax 0x00000069 push edx 0x0000006a pushad 0x0000006b push eax 0x0000006c push edx 0x0000006d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E53D5 second address: 5E53E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F3BD4C9CF86h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E6418 second address: 5E6427 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3BD4DEAE4Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E64FD second address: 5E6532 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF96h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F3BD4C9CF96h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC617 second address: 5EC679 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push eax 0x0000000b call 00007F3BD4DEAE48h 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc eax 0x0000001e push eax 0x0000001f ret 0x00000020 pop eax 0x00000021 ret 0x00000022 and bx, F5B2h 0x00000027 push 00000000h 0x00000029 mov ebx, dword ptr [ebp+122D2B8Dh] 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ecx 0x00000034 call 00007F3BD4DEAE48h 0x00000039 pop ecx 0x0000003a mov dword ptr [esp+04h], ecx 0x0000003e add dword ptr [esp+04h], 00000016h 0x00000046 inc ecx 0x00000047 push ecx 0x00000048 ret 0x00000049 pop ecx 0x0000004a ret 0x0000004b mov ebx, ecx 0x0000004d mov dword ptr [ebp+122D2EDDh], edx 0x00000053 xchg eax, esi 0x00000054 push eax 0x00000055 push edx 0x00000056 pushad 0x00000057 push eax 0x00000058 push edx 0x00000059 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC679 second address: 5EC680 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EA664 second address: 5EA67D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jbe 00007F3BD4DEAE54h 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E7477 second address: 5E747D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E747D second address: 5E7539 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE59h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e jg 00007F3BD4DEAE4Bh 0x00000014 push dword ptr fs:[00000000h] 0x0000001b push 00000000h 0x0000001d push edx 0x0000001e call 00007F3BD4DEAE48h 0x00000023 pop edx 0x00000024 mov dword ptr [esp+04h], edx 0x00000028 add dword ptr [esp+04h], 00000014h 0x00000030 inc edx 0x00000031 push edx 0x00000032 ret 0x00000033 pop edx 0x00000034 ret 0x00000035 mov edi, dword ptr [ebp+1246EA57h] 0x0000003b mov dword ptr fs:[00000000h], esp 0x00000042 push 00000000h 0x00000044 push ebp 0x00000045 call 00007F3BD4DEAE48h 0x0000004a pop ebp 0x0000004b mov dword ptr [esp+04h], ebp 0x0000004f add dword ptr [esp+04h], 00000016h 0x00000057 inc ebp 0x00000058 push ebp 0x00000059 ret 0x0000005a pop ebp 0x0000005b ret 0x0000005c pushad 0x0000005d xor dword ptr [ebp+122D2461h], edi 0x00000063 xor ecx, dword ptr [ebp+1246EA57h] 0x00000069 popad 0x0000006a mov eax, dword ptr [ebp+122D0D2Dh] 0x00000070 mov di, 6493h 0x00000074 push FFFFFFFFh 0x00000076 xor dword ptr [ebp+122D37D1h], esi 0x0000007c nop 0x0000007d jp 00007F3BD4DEAE52h 0x00000083 push eax 0x00000084 pushad 0x00000085 push eax 0x00000086 push edx 0x00000087 jmp 00007F3BD4DEAE4Ah 0x0000008c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E7539 second address: 5E753D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EE7E2 second address: 5EE7E8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EEA33 second address: 5EEA4B instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3BD4C9CF86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d jg 00007F3BD4C9CF88h 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE076 second address: 5FE08D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 js 00007F3BD4DEAE4Eh 0x0000000b pushad 0x0000000c popad 0x0000000d jp 00007F3BD4DEAE46h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE08D second address: 5FE091 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE091 second address: 5FE09B instructions: 0x00000000 rdtsc 0x00000002 ja 00007F3BD4DEAE46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE1F0 second address: 5FE204 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4C9CF8Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE365 second address: 5FE374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F3BD4DEAE46h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE374 second address: 5FE378 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE378 second address: 5FE39B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F3BD4DEAE4Ch 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 push edi 0x00000013 pop edi 0x00000014 pushad 0x00000015 popad 0x00000016 pop esi 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE39B second address: 5FE39F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE39F second address: 5FE3A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE3A5 second address: 5FE3B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F3BD4C9CF86h 0x00000009 push eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 605982 second address: 605986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 605986 second address: 60598A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60598A second address: 6059A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F3BD4DEAE55h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C04F second address: 60C05E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007F3BD4C9CF86h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C05E second address: 60C06B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jng 00007F3BD4DEAE46h 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C06B second address: 60C075 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F3BD4C9CF86h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C075 second address: 60C079 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C4A4 second address: 60C4A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C4A9 second address: 60C4B6 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3BD4DEAE48h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C7E9 second address: 60C7F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C7F0 second address: 60C7F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C7F9 second address: 60C7FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C93F second address: 60C945 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C945 second address: 60C94B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C94B second address: 60C95F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jno 00007F3BD4DEAE46h 0x0000000c push edx 0x0000000d pop edx 0x0000000e popad 0x0000000f pushad 0x00000010 push esi 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC3B5 second address: 5DC3C3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F3BD4C9CF8Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC3C3 second address: 5DC3E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F3BD4DEAE55h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC3E4 second address: 5DC45D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a jmp 00007F3BD4C9CF91h 0x0000000f pushad 0x00000010 jnc 00007F3BD4C9CF86h 0x00000016 jns 00007F3BD4C9CF86h 0x0000001c popad 0x0000001d popad 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 pushad 0x00000023 pushad 0x00000024 jmp 00007F3BD4C9CF8Ch 0x00000029 push eax 0x0000002a pop eax 0x0000002b popad 0x0000002c ja 00007F3BD4C9CF8Ch 0x00000032 popad 0x00000033 pop eax 0x00000034 jmp 00007F3BD4C9CF8Ch 0x00000039 call 00007F3BD4C9CF89h 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F3BD4C9CF94h 0x00000046 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC45D second address: 5DC4C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE57h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F3BD4DEAE58h 0x0000000e popad 0x0000000f push eax 0x00000010 push ecx 0x00000011 pushad 0x00000012 push eax 0x00000013 pop eax 0x00000014 jp 00007F3BD4DEAE46h 0x0000001a popad 0x0000001b pop ecx 0x0000001c mov eax, dword ptr [esp+04h] 0x00000020 pushad 0x00000021 pushad 0x00000022 jmp 00007F3BD4DEAE4Dh 0x00000027 jmp 00007F3BD4DEAE4Eh 0x0000002c popad 0x0000002d push eax 0x0000002e push edx 0x0000002f jbe 00007F3BD4DEAE46h 0x00000035 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC4C8 second address: 5DC507 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF98h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [eax] 0x0000000c pushad 0x0000000d jmp 00007F3BD4C9CF8Ah 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F3BD4C9CF93h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC5F5 second address: 5DC5FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC67D second address: 5DC681 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC9A7 second address: 5DC9AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DC9AB second address: 5DC9B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007F3BD4C9CF86h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DCDF3 second address: 5DCDF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DD11D second address: 5DD16E instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3BD4C9CF9Eh 0x00000008 jmp 00007F3BD4C9CF98h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edi 0x00000012 pushad 0x00000013 popad 0x00000014 pop edi 0x00000015 pop eax 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a pushad 0x0000001b jmp 00007F3BD4C9CF92h 0x00000020 pushad 0x00000021 push edx 0x00000022 pop edx 0x00000023 jnl 00007F3BD4C9CF86h 0x00000029 popad 0x0000002a popad 0x0000002b mov eax, dword ptr [eax] 0x0000002d push ecx 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DD16E second address: 5DD18D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ecx 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F3BD4DEAE50h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DD277 second address: 5DD27B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DD27B second address: 5DD27F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DD27F second address: 5DD289 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611114 second address: 61111F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F3BD4DEAE46h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6113F4 second address: 611405 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F3BD4C9CF86h 0x00000009 jo 00007F3BD4C9CF86h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611405 second address: 61140D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61155E second address: 611576 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4C9CF94h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611576 second address: 61159C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F3BD4DEAE46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F3BD4DEAE58h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61159C second address: 6115C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF8Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d popad 0x0000000e pushad 0x0000000f jbe 00007F3BD4C9CF8Ah 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 pushad 0x00000018 popad 0x00000019 js 00007F3BD4C9CF92h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6115C6 second address: 6115CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61172D second address: 611744 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4C9CF8Fh 0x00000009 pop edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611A0A second address: 611A18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 jnl 00007F3BD4DEAE46h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61624E second address: 61626B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF99h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58C843 second address: 58C847 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58C847 second address: 58C850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F2BE second address: 61F2CA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F2CA second address: 61F2DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 js 00007F3BD4C9CF8Eh 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F40A second address: 61F410 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F410 second address: 61F43A instructions: 0x00000000 rdtsc 0x00000002 je 00007F3BD4C9CF8Ah 0x00000008 pushad 0x00000009 jmp 00007F3BD4C9CF95h 0x0000000e jns 00007F3BD4C9CF86h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F43A second address: 61F460 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push ecx 0x00000008 jmp 00007F3BD4DEAE4Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F3BD4DEAE4Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F460 second address: 61F464 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61FE05 second address: 61FE16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4DEAE4Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61FE16 second address: 61FE1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61FE1F second address: 61FE29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F3BD4DEAE46h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62032B second address: 620343 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push edx 0x00000008 pop edx 0x00000009 jnl 00007F3BD4C9CF86h 0x0000000f pop ebx 0x00000010 jo 00007F3BD4C9CF8Eh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 620343 second address: 62035E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jne 00007F3BD4DEAE5Ch 0x0000000d pushad 0x0000000e jc 00007F3BD4DEAE46h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 627316 second address: 62731F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62731F second address: 627325 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 627325 second address: 627329 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626C90 second address: 626C96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626C96 second address: 626CA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62984F second address: 629853 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59A189 second address: 59A18D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59A18D second address: 59A197 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62D871 second address: 62D877 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62D877 second address: 62D87B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62D9A8 second address: 62D9E6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F3BD4C9CF95h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jns 00007F3BD4C9CF86h 0x00000012 push edi 0x00000013 pop edi 0x00000014 pop ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F3BD4C9CF97h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62DE10 second address: 62DE14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62DE14 second address: 62DE32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F3BD4C9CF94h 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62DE32 second address: 62DE78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE59h 0x00000007 jmp 00007F3BD4DEAE4Ah 0x0000000c pop edx 0x0000000d pop eax 0x0000000e popad 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F3BD4DEAE59h 0x00000017 push esi 0x00000018 pop esi 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 632288 second address: 63228E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63228E second address: 6322BC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3BD4DEAE46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b js 00007F3BD4DEAE46h 0x00000011 jc 00007F3BD4DEAE46h 0x00000017 jmp 00007F3BD4DEAE56h 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63155F second address: 631565 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6316AD second address: 6316B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6316B2 second address: 6316B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6316B7 second address: 6316BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 631984 second address: 631999 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F3BD4C9CF8Dh 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 637F4F second address: 637F90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jnp 00007F3BD4DEAE48h 0x00000010 push edx 0x00000011 pop edx 0x00000012 pushad 0x00000013 jbe 00007F3BD4DEAE46h 0x00000019 jmp 00007F3BD4DEAE58h 0x0000001e push ecx 0x0000001f pop ecx 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 637F90 second address: 637F94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636A6C second address: 636A74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636A74 second address: 636A7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636E75 second address: 636EB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Ch 0x00000007 jmp 00007F3BD4DEAE56h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F3BD4DEAE52h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636EB1 second address: 636EB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636EB5 second address: 636ECE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE55h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636ECE second address: 636ED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636ED8 second address: 636EDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636EDC second address: 636EE5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DCC0B second address: 5DCC10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DCC10 second address: 5DCC6B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F3BD4C9CF99h 0x0000000e nop 0x0000000f clc 0x00000010 push 00000004h 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007F3BD4C9CF88h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 00000016h 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c add dword ptr [ebp+122DB64Fh], ecx 0x00000032 nop 0x00000033 pushad 0x00000034 jmp 00007F3BD4C9CF8Bh 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DCC6B second address: 5DCC6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6405A0 second address: 6405A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6405A4 second address: 6405A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6405A8 second address: 6405C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F3BD4C9CF92h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5892FD second address: 589302 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63E652 second address: 63E658 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63E658 second address: 63E65C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63E7C3 second address: 63E7E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF98h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63EAFE second address: 63EB26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jc 00007F3BD4DEAE4Ah 0x0000000b push eax 0x0000000c pop eax 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push ecx 0x00000010 jmp 00007F3BD4DEAE56h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63F124 second address: 63F13C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F3BD4C9CF86h 0x0000000a jo 00007F3BD4C9CF92h 0x00000010 jo 00007F3BD4C9CF86h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63F968 second address: 63F972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63F972 second address: 63F987 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63F987 second address: 63F98D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63F98D second address: 63F991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63F991 second address: 63F9B8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F3BD4DEAE55h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jnl 00007F3BD4DEAE46h 0x00000016 pop edi 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63FCFC second address: 63FD0A instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3BD4C9CF86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63FD0A second address: 63FD0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63FFDB second address: 63FFFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F3BD4C9CF86h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F3BD4C9CF93h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63FFFC second address: 640002 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6402C1 second address: 6402C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6488D1 second address: 6488D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6488D5 second address: 6488DB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6488DB second address: 6488E5 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F3BD4DEAE4Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6488E5 second address: 6488F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jng 00007F3BD4C9CF8Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 648B9B second address: 648B9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 648B9F second address: 648BA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 648BA3 second address: 648BBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F3BD4DEAE4Bh 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 648BBA second address: 648BC8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F3BD4C9CF8Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 648D36 second address: 648D3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64F92E second address: 64F934 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64F934 second address: 64F954 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Eh 0x00000007 push ebx 0x00000008 jmp 00007F3BD4DEAE4Dh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64FAAC second address: 64FAB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64FF42 second address: 64FF4C instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3BD4DEAE4Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 650598 second address: 65059C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 650E90 second address: 650E9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F3BD4DEAE46h 0x0000000a pop edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6583B5 second address: 6583BF instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F3BD4C9CF8Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65BBB4 second address: 65BBBC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65BBBC second address: 65BBC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jne 00007F3BD4C9CF86h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66565E second address: 665664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59BB02 second address: 59BB0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59BB0B second address: 59BB0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59BB0F second address: 59BB1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F3BD4C9CF8Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 669B07 second address: 669B0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 669B0B second address: 669B19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F3BD4C9CF92h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 669B19 second address: 669B1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 669B1F second address: 669B3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4C9CF97h 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 669539 second address: 669556 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE58h 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6696B2 second address: 6696B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66BEFA second address: 66BF00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66BF00 second address: 66BF04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66BF04 second address: 66BF14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F3BD4DEAE4Ah 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66BF14 second address: 66BF1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66BF1A second address: 66BF1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66BF1E second address: 66BF22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66DB27 second address: 66DB2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66DB2B second address: 66DB5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jno 00007F3BD4C9CF86h 0x0000000f push eax 0x00000010 pop eax 0x00000011 jmp 00007F3BD4C9CF93h 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 pushad 0x0000001a push edi 0x0000001b pop edi 0x0000001c jno 00007F3BD4C9CF86h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 674679 second address: 674698 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F3BD4DEAE54h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 674698 second address: 6746AC instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F3BD4C9CF86h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnp 00007F3BD4C9CF86h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 678838 second address: 67883F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67DB97 second address: 67DBB5 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F3BD4C9CF86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007F3BD4C9CF92h 0x00000012 jc 00007F3BD4C9CF86h 0x00000018 jc 00007F3BD4C9CF86h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67DBB5 second address: 67DBBA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67FB0D second address: 67FB38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF8Eh 0x00000007 jmp 00007F3BD4C9CF92h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67FB38 second address: 67FB3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67FB3C second address: 67FB4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F3BD4C9CF8Ah 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67FB4C second address: 67FB62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE4Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007F3BD4DEAE46h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 682B5C second address: 682B66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6888CE second address: 6888D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688A19 second address: 688A1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688A1E second address: 688A39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3BD4DEAE55h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688A39 second address: 688A3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688BB8 second address: 688BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F3BD4DEAE59h 0x0000000a push edx 0x0000000b jo 00007F3BD4DEAE46h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688BDF second address: 688BE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688BE7 second address: 688C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4DEAE54h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688D45 second address: 688D52 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F3BD4C9CF86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688D52 second address: 688D63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F3BD4DEAE46h 0x0000000a jbe 00007F3BD4DEAE46h 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 688D63 second address: 688D6A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 689D76 second address: 689D82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68C857 second address: 68C85D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68C85D second address: 68C86F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jnp 00007F3BD4DEAE46h 0x0000000b jnp 00007F3BD4DEAE46h 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68C9F8 second address: 68CA10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF92h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A4C99 second address: 6A4D1B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push ecx 0x00000009 jmp 00007F3BD4DEAE59h 0x0000000e jmp 00007F3BD4DEAE59h 0x00000013 pop ecx 0x00000014 jnl 00007F3BD4DEAE5Dh 0x0000001a jmp 00007F3BD4DEAE51h 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F3BD4DEAE56h 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AC518 second address: 6AC522 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3BD4C9CF86h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AC522 second address: 6AC52F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AB9F1 second address: 6AB9FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jnp 00007F3BD4C9CF86h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AC0BD second address: 6AC0C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AC243 second address: 6AC25B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF93h 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AC25B second address: 6AC261 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B12E9 second address: 6B12EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B12EF second address: 6B12F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B12F6 second address: 6B1310 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF90h 0x00000007 jc 00007F3BD4C9CF92h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58E2FA second address: 58E2FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58E2FE second address: 58E307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0D04 second address: 6B0D0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B62C9 second address: 6B62E3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F3BD4C9CF8Ch 0x00000008 jo 00007F3BD4C9CF86h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edi 0x00000012 push eax 0x00000013 push edx 0x00000014 ja 00007F3BD4C9CF86h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9A53 second address: 6B9A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F3BD4DEAE59h 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9A73 second address: 6B9A7A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9589 second address: 6B9591 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6BB541 second address: 6BB545 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6BB545 second address: 6BB551 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6BB551 second address: 6BB555 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6BB555 second address: 6BB575 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4DEAE56h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B234E second address: 6B2354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B2354 second address: 6B235C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0E26 second address: 6B0E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0E2B second address: 6B0E3C instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3BD4DEAE48h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0E3C second address: 6B0E40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0E40 second address: 6B0E6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3BD4DEAE4Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F3BD4DEAE54h 0x00000011 push edi 0x00000012 pop edi 0x00000013 jmp 00007F3BD4DEAE4Ch 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0FB3 second address: 6B0FCD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3BD4C9CF8Ch 0x00000007 jnl 00007F3BD4C9CF86h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B0FCD second address: 6B100E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3BD4DEAE46h 0x00000008 js 00007F3BD4DEAE46h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F3BD4DEAE4Bh 0x00000017 jmp 00007F3BD4DEAE4Ah 0x0000001c jmp 00007F3BD4DEAE54h 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 push ecx 0x00000026 pop ecx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B117B second address: 6B11AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jc 00007F3BD4C9CF9Fh 0x0000000b jmp 00007F3BD4C9CF99h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F3BD4C9CF8Bh 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B11AC second address: 6B11BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F3BD4DEAE46h 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D5AC3 second address: 5D5ACD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3BD4C9CF8Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 5DBE47 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 65C500 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4EB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 5060000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 7060000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042E003 rdtsc 0_2_0042E003
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B6A2F sidt fword ptr [esp-02h]0_2_005B6A2F
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8028Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006034FF GetSystemInfo,VirtualAlloc,0_2_006034FF
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042E003 rdtsc 0_2_0042E003
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042B7DE LdrInitializeThunk,0_2_0042B7DE
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, file.exe, 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Program Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F78E5 GetSystemTime,GetFileTime,0_2_005F78E5

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
271
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS271
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets24
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Bypass User Account Control
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    time.windows.com
    unknown
    unknownfalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1560142
      Start date and time:2024-11-21 13:09:06 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 39s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:file.exe
      Detection:MAL
      Classification:mal100.evad.winEXE@1/1@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 20.101.57.9
      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, twc.trafficmanager.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • VT rate limit hit for: file.exe
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0017.t-0009.t-msedge.netfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
      • 13.107.246.45
      Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • 13.107.246.45
      APPENDIX FORM_N#U00b045013-20241120.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
      • 13.107.246.45
      file.exeGet hashmaliciousLummaCBrowse
      • 13.107.246.45
      Payslip-21 November, 2024 ZmPQwjYq1NGSTsWga2.htmGet hashmaliciousBlackHacker JS ObfuscatorBrowse
      • 13.107.246.45
      phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      file.exeGet hashmaliciousLummaCBrowse
      • 13.107.246.45
      CB1.exeGet hashmaliciousBlackMoonBrowse
      • 13.107.246.45
      +11375 Caller left Vc MsG 8b1538917f01661e6746a0528d545dbeac3b40a5- 73945.msgGet hashmaliciousHtmlDropperBrowse
      • 13.107.246.45
      file.exeGet hashmaliciousLummaCBrowse
      • 13.107.246.45
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\file.exe
      File Type:CSV text
      Category:dropped
      Size (bytes):226
      Entropy (8bit):5.360398796477698
      Encrypted:false
      SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
      MD5:3A8957C6382192B71471BD14359D0B12
      SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
      SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
      SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.508530255289309
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:file.exe
      File size:2'754'048 bytes
      MD5:21f1d579996c0e223529d781d9390c05
      SHA1:db238f2cc489e22158603b17a49e6fd43b314d74
      SHA256:64a5b57d555ef999a209a254c0324edd6f03832ee9f688444e101f526662c5b3
      SHA512:b33f98a8cd81a3cb0cffb4aaff551156e0aa384dffe8b7b7f6751370221be6f504f12c79aa38df7967c9c06a57b42e59d76f12fa3594e797d42aabc2896277c9
      SSDEEP:24576:RBs2Yty3S5XqyOqARl+LWWQsmQn7AKJKrAs3KuOYF5QadGUM768SYKXaTV6cbATy:RCqq2YLWWQi7V681eq6STpzL0a
      TLSH:D3D517A2B80972CFD48E17B8917BCD47995D03B94B1048CBD86CA87E7D77EC115ABC28
      File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$............*.. ...`....@.. ........................*.......*...`................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x6a8000
      Entrypoint Section:.taggant
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
      Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:2eabe9054cad5152567f0699947a2c5b
      Instruction
      jmp 00007F3BD515A5EAh
      pmulhuw mm5, qword ptr [ecx]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add cl, ch
      add byte ptr [eax], ah
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      0x20000x40000x12005dc43ccccd699f626932708542fa3ee4False0.9320746527777778data7.765265667159949IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      ybikrwjp0xa0000x29c0000x29a600da2a275458efbbbaaf33817748b24102unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      qvqhdqdc0x2a60000x20000x4001636b837ee9d74f7357d5964eb7c4279False0.7763671875data6.156539531587037IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .taggant0x2a80000x40000x2200856a74e16f3441fd89886941e9ac9702False0.006548713235294118DOS executable (COM)0.019571456231530684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x60900x30cdata0.42948717948717946
      RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      kernel32.dlllstrcpy
      TimestampSource PortDest PortSource IPDest IP
      Nov 21, 2024 13:10:07.298259974 CET6466153192.168.2.71.1.1.1
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Nov 21, 2024 13:10:07.298259974 CET192.168.2.71.1.1.10xc749Standard query (0)time.windows.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Nov 21, 2024 13:10:07.532176018 CET1.1.1.1192.168.2.70xc749No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
      Nov 21, 2024 13:10:09.857238054 CET1.1.1.1192.168.2.70x645dNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Nov 21, 2024 13:10:09.857238054 CET1.1.1.1192.168.2.70x645dNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Target ID:0
      Start time:07:10:12
      Start date:21/11/2024
      Path:C:\Users\user\Desktop\file.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\file.exe"
      Imagebase:0x420000
      File size:2'754'048 bytes
      MD5 hash:21F1D579996C0E223529D781D9390C05
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:6%
        Dynamic/Decrypted Code Coverage:3.3%
        Signature Coverage:4.7%
        Total number of Nodes:365
        Total number of Limit Nodes:21
        execution_graph 8400 5f8a1f 8405 5f3798 GetCurrentThreadId 8400->8405 8402 5f8a2b 8403 5f8a93 MapViewOfFileEx 8402->8403 8404 5f8a44 8402->8404 8403->8404 8407 5f37b0 8405->8407 8406 5f37f7 8406->8402 8407->8406 8408 5f37e6 Sleep 8407->8408 8408->8407 8607 430220 8609 430c66 8607->8609 8608 4333be 8609->8608 8611 6036a0 8609->8611 8612 6036ae 8611->8612 8613 6036ce 8612->8613 8615 603970 8612->8615 8613->8608 8616 603980 8615->8616 8618 6039a3 8615->8618 8617 603d6a 2 API calls 8616->8617 8616->8618 8617->8618 8618->8612 8619 604503 8621 60450f 8619->8621 8622 604521 8621->8622 8627 5f4df7 8622->8627 8625 604549 8635 5f4e5e 8627->8635 8629 5f4e0c 8629->8625 8630 6040c0 8629->8630 8632 604154 8630->8632 8633 6040d1 8630->8633 8631 603d6a 2 API calls 8631->8633 8632->8625 8633->8631 8633->8632 8634 603f2b VirtualProtect 8633->8634 8634->8633 8637 5f4e6b 8635->8637 8639 5f4e81 8637->8639 8638 5f4e89 8642 5f4f69 8638->8642 8643 5f4f56 8638->8643 8639->8638 8640 5f4ea6 8639->8640 8654 604772 8639->8654 8641 5f3798 2 API calls 8640->8641 8645 5f4eab 8641->8645 8647 5f4f87 LoadLibraryExA 8642->8647 8648 5f4f73 LoadLibraryExW 8642->8648 8676 5f4c96 8643->8676 8649 5f3eaa 2 API calls 8645->8649 8650 5f4f2d 8647->8650 8648->8650 8651 5f4ebc 8649->8651 8651->8638 8653 5f4eea 8651->8653 8656 5f47d6 8653->8656 8680 604781 8654->8680 8657 5f47fc 8656->8657 8658 5f47f2 8656->8658 8688 5f4029 8657->8688 8658->8650 8665 5f484c 8666 5f4879 8665->8666 8675 5f48f6 8665->8675 8698 5f4207 8665->8698 8702 5f44a2 8666->8702 8669 5f4884 8669->8675 8707 5f4419 8669->8707 8672 5f48d9 8674 6040c0 2 API calls 8672->8674 8672->8675 8674->8675 8675->8658 8715 5f4fe8 8675->8715 8677 5f4ca1 8676->8677 8678 5f4cc2 LoadLibraryExA 8677->8678 8679 5f4cb1 8677->8679 8678->8679 8679->8650 8681 604791 8680->8681 8682 5f3798 2 API calls 8681->8682 8687 6047e3 8681->8687 8683 6047f9 8682->8683 8684 5f3eaa 2 API calls 8683->8684 8685 60480b 8684->8685 8686 5f3eaa 2 API calls 8685->8686 8685->8687 8686->8687 8689 5f409e 8688->8689 8690 5f4045 8688->8690 8689->8658 8692 5f40cf VirtualAlloc 8689->8692 8690->8689 8691 5f4075 VirtualAlloc 8690->8691 8691->8689 8693 5f4114 8692->8693 8693->8675 8694 5f414c 8693->8694 8697 5f4174 8694->8697 8695 5f41eb 8695->8665 8696 5f418d VirtualAlloc 8696->8695 8696->8697 8697->8695 8697->8696 8700 5f4227 8698->8700 8701 5f4222 8698->8701 8699 5f425a lstrcmpiA 8699->8700 8699->8701 8700->8699 8700->8701 8701->8666 8703 5f45ae 8702->8703 8705 5f44cf 8702->8705 8703->8669 8705->8703 8717 5f3fb4 8705->8717 8725 5f50c5 8705->8725 8708 5f4442 8707->8708 8709 5f4483 8708->8709 8710 5f445a VirtualProtect 8708->8710 8709->8672 8709->8675 8711 6043c7 8709->8711 8710->8708 8710->8709 8712 604494 8711->8712 8713 6043e3 8711->8713 8712->8672 8713->8712 8714 603f2b VirtualProtect 8713->8714 8714->8713 8751 5f4ff4 8715->8751 8718 5f4df7 18 API calls 8717->8718 8720 5f3fc7 8718->8720 8719 5f400d 8719->8705 8720->8719 8721 5f4019 8720->8721 8723 5f3ff0 8720->8723 8722 5f4fe8 3 API calls 8721->8722 8722->8719 8723->8719 8724 5f4fe8 3 API calls 8723->8724 8724->8719 8727 5f50ce 8725->8727 8728 5f50dd 8727->8728 8729 5f50e5 8728->8729 8731 5f3798 2 API calls 8728->8731 8730 5f5112 GetProcAddress 8729->8730 8732 5f5108 8730->8732 8733 5f50ef 8731->8733 8734 5f50ff 8733->8734 8735 5f510d 8733->8735 8737 5f4b26 8734->8737 8735->8730 8738 5f4b45 8737->8738 8742 5f4c12 8737->8742 8739 5f4b82 lstrcmpiA 8738->8739 8740 5f4bac 8738->8740 8738->8742 8739->8738 8739->8740 8740->8742 8743 5f4a6f 8740->8743 8742->8732 8744 5f4a80 8743->8744 8745 5f4ab0 lstrcpyn 8744->8745 8750 5f4b0b 8744->8750 8747 5f4acc 8745->8747 8745->8750 8746 5f3fb4 17 API calls 8748 5f4afa 8746->8748 8747->8746 8747->8750 8749 5f50c5 17 API calls 8748->8749 8748->8750 8749->8750 8750->8742 8752 5f5003 8751->8752 8753 5f500b 8752->8753 8755 5f3798 2 API calls 8752->8755 8754 5f5059 FreeLibrary 8753->8754 8759 5f5040 8754->8759 8756 5f5015 8755->8756 8756->8753 8757 5f5025 8756->8757 8760 5f49d6 8757->8760 8761 5f49f9 8760->8761 8762 5f4a39 8760->8762 8761->8762 8764 5f3592 8761->8764 8762->8759 8765 5f359b 8764->8765 8766 5f35b3 8765->8766 8768 5f3579 8765->8768 8766->8762 8769 5f4fe8 GetCurrentThreadId Sleep FreeLibrary 8768->8769 8770 5f3586 8769->8770 8770->8765 8771 4eb0d48 8773 4eb0d4c OpenSCManagerW 8771->8773 8774 4eb0ddc 8773->8774 8775 4eb1308 8776 4eb1349 ImpersonateLoggedOnUser 8775->8776 8777 4eb1376 8776->8777 8409 5f545a 8410 5f3798 2 API calls 8409->8410 8411 5f5466 8410->8411 8412 5f5484 8411->8412 8416 5f3eaa 8411->8416 8414 5f54b5 GetModuleHandleExA 8412->8414 8415 5f548c 8412->8415 8414->8415 8417 5f3ebb 8416->8417 8418 5f3ef8 8416->8418 8417->8418 8420 5f3d4b 8417->8420 8418->8412 8422 5f3d78 8420->8422 8421 5f3e7e 8421->8417 8422->8421 8423 5f3da6 PathAddExtensionA 8422->8423 8424 5f3dc1 8422->8424 8423->8424 8428 5f3de3 8424->8428 8432 5f39ec 8424->8432 8425 5f3e2c 8425->8421 8427 5f3e55 8425->8427 8430 5f39ec lstrcmpiA 8425->8430 8427->8421 8431 5f39ec lstrcmpiA 8427->8431 8428->8421 8428->8425 8429 5f39ec lstrcmpiA 8428->8429 8429->8425 8430->8427 8431->8421 8433 5f3a0a 8432->8433 8434 5f3a21 8433->8434 8436 5f3969 8433->8436 8434->8428 8438 5f3994 8436->8438 8437 5f39dc 8437->8434 8438->8437 8439 5f39c6 lstrcmpiA 8438->8439 8439->8437 8440 5f7853 8441 5f3798 2 API calls 8440->8441 8442 5f785f GetCurrentProcess 8441->8442 8443 5f78ab 8442->8443 8445 5f786f 8442->8445 8444 5f78b0 DuplicateHandle 8443->8444 8446 5f78a6 8444->8446 8445->8443 8447 5f789a 8445->8447 8449 5f55f0 8447->8449 8451 5f561a 8449->8451 8450 5f56ad 8450->8446 8451->8450 8453 5f55d8 8451->8453 8456 5f3643 8453->8456 8457 5f3659 8456->8457 8458 5f3673 8457->8458 8460 5f3627 8457->8460 8458->8450 8463 5f55b1 CloseHandle 8460->8463 8462 5f3637 8462->8458 8464 5f55c5 8463->8464 8464->8462 8778 60454f 8780 60455b 8778->8780 8781 60456d 8780->8781 8786 5f4e10 8781->8786 8783 60457c 8784 604595 8783->8784 8785 6040c0 GetModuleFileNameA VirtualProtect 8783->8785 8785->8784 8788 5f4e1c 8786->8788 8789 5f4e31 8788->8789 8790 5f4e5e 18 API calls 8789->8790 8791 5f4e4f 8789->8791 8790->8791 8465 5ae54a 8466 5b165e LoadLibraryA 8465->8466 8468 5f7fcf 8470 5f7fdb 8468->8470 8471 5f3798 2 API calls 8470->8471 8472 5f7fe7 8471->8472 8474 5f8007 8472->8474 8475 5f7edb 8472->8475 8477 5f7ee7 8475->8477 8478 5f7efb 8477->8478 8479 5f3798 2 API calls 8478->8479 8480 5f7f13 8479->8480 8481 5f7f28 8480->8481 8501 5f7df4 8480->8501 8485 5f7f30 8481->8485 8493 5f7e99 IsBadWritePtr 8481->8493 8488 5f7fa4 CreateFileA 8485->8488 8489 5f7f81 CreateFileW 8485->8489 8486 5f3eaa 2 API calls 8487 5f7f63 8486->8487 8487->8485 8490 5f7f6b 8487->8490 8492 5f7f71 8488->8492 8489->8492 8495 5f56ee 8490->8495 8494 5f7ebb 8493->8494 8494->8485 8494->8486 8496 5f56fb 8495->8496 8497 5f5734 CreateFileA 8496->8497 8500 5f57f6 8496->8500 8498 5f5780 8497->8498 8499 5f55b1 CloseHandle 8498->8499 8498->8500 8499->8500 8500->8492 8503 5f7e03 GetWindowsDirectoryA 8501->8503 8504 5f7e2d 8503->8504 8792 42e8f2 8793 42f6e2 VirtualAlloc 8792->8793 8794 5f4faf 8795 5f4df7 18 API calls 8794->8795 8796 5f4fc2 8795->8796 8797 5f7d68 8799 5f7d74 8797->8799 8800 5f3798 2 API calls 8799->8800 8801 5f7d80 8800->8801 8803 5f7da0 8801->8803 8804 5f7cbf 8801->8804 8806 5f7ccb 8804->8806 8807 5f7cdf 8806->8807 8808 5f3798 2 API calls 8807->8808 8809 5f7cf7 8808->8809 8817 5f3efc 8809->8817 8812 5f7d22 8813 5f3eaa 2 API calls 8814 5f7d1a 8813->8814 8814->8812 8815 5f7d4f GetFileAttributesA 8814->8815 8816 5f7d3e GetFileAttributesW 8814->8816 8815->8812 8816->8812 8818 5f3fb0 8817->8818 8819 5f3f10 8817->8819 8818->8812 8818->8813 8819->8818 8820 5f3d4b 2 API calls 8819->8820 8820->8819 8505 5f5307 8507 5f5313 8505->8507 8508 5f5327 8507->8508 8510 5f534f 8508->8510 8511 5f5368 8508->8511 8513 5f5371 8511->8513 8514 5f5380 8513->8514 8515 5f5388 8514->8515 8516 5f3798 2 API calls 8514->8516 8517 5f542b GetModuleHandleW 8515->8517 8518 5f5439 GetModuleHandleA 8515->8518 8519 5f5392 8516->8519 8522 5f53c0 8517->8522 8518->8522 8520 5f53ad 8519->8520 8521 5f3eaa 2 API calls 8519->8521 8520->8515 8520->8522 8521->8520 8821 604499 8823 6044a5 8821->8823 8824 6044b7 8823->8824 8825 6040c0 2 API calls 8824->8825 8826 6044c9 8825->8826 8523 4eb10f0 8524 4eb10f4 8523->8524 8527 5f64ec 8524->8527 8525 4eb1151 8528 5f3798 2 API calls 8527->8528 8529 5f64f8 8528->8529 8530 5f6511 8529->8530 8532 5f6521 8529->8532 8531 5f55d8 CloseHandle 8530->8531 8534 5f6517 8531->8534 8533 5f6526 CloseHandle 8532->8533 8533->8534 8534->8525 8827 4eb1510 8828 4eb1514 ControlService 8827->8828 8830 4eb158f 8828->8830 8831 60459b 8833 6045a7 8831->8833 8834 6045c4 8833->8834 8835 5f50c5 18 API calls 8834->8835 8836 6045f7 8835->8836 8535 42b7de 8536 42b7e3 8535->8536 8536->8536 8537 42b94e LdrInitializeThunk 8536->8537 8837 42e4fe 8838 42e57f VirtualAlloc 8837->8838 8839 42e5d9 8838->8839 8840 5f80e2 8842 5f80eb 8840->8842 8843 5f3798 2 API calls 8842->8843 8844 5f80f7 8843->8844 8845 5f8110 8844->8845 8846 5f8147 ReadFile 8844->8846 8846->8845 8538 5f88c1 8540 5f88cd 8538->8540 8542 5f88e5 8540->8542 8543 5f890f 8542->8543 8544 5f87fb 8542->8544 8546 5f8807 8544->8546 8547 5f3798 2 API calls 8546->8547 8548 5f881a 8547->8548 8549 5f8858 8548->8549 8550 5f8893 8548->8550 8553 5f8834 8548->8553 8549->8553 8554 5f5ed2 8549->8554 8551 5f8898 CreateFileMappingA 8550->8551 8551->8553 8556 5f5ee9 8554->8556 8555 5f5f52 CreateFileA 8558 5f5f97 8555->8558 8556->8555 8557 5f5fe6 8556->8557 8557->8553 8558->8557 8559 5f55b1 CloseHandle 8558->8559 8559->8557 8560 6034ff GetSystemInfo 8561 60355d VirtualAlloc 8560->8561 8562 60351f 8560->8562 8575 60384b 8561->8575 8562->8561 8564 6035a4 8565 603679 8564->8565 8566 60384b VirtualAlloc GetModuleFileNameA VirtualProtect 8564->8566 8567 603695 GetModuleFileNameA VirtualProtect 8565->8567 8574 60363d 8565->8574 8568 6035ce 8566->8568 8567->8574 8568->8565 8569 60384b VirtualAlloc GetModuleFileNameA VirtualProtect 8568->8569 8570 6035f8 8569->8570 8570->8565 8571 60384b VirtualAlloc GetModuleFileNameA VirtualProtect 8570->8571 8572 603622 8571->8572 8572->8565 8573 60384b VirtualAlloc GetModuleFileNameA VirtualProtect 8572->8573 8572->8574 8573->8565 8577 603853 8575->8577 8578 603867 8577->8578 8579 60387f 8577->8579 8585 603717 8578->8585 8581 603717 2 API calls 8579->8581 8582 603890 8581->8582 8587 6038a2 8582->8587 8590 60371f 8585->8590 8588 6038b3 VirtualAlloc 8587->8588 8589 60389e 8587->8589 8588->8589 8591 603732 8590->8591 8593 603775 8591->8593 8594 603d6a 8591->8594 8597 603d71 8594->8597 8596 603dbb 8596->8593 8597->8596 8599 603c78 8597->8599 8603 603f2b 8597->8603 8602 603c8d 8599->8602 8600 603d4d 8600->8597 8601 603d17 GetModuleFileNameA 8601->8602 8602->8600 8602->8601 8605 603f3f 8603->8605 8604 603f57 8604->8597 8605->8604 8606 60407a VirtualProtect 8605->8606 8606->8605

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 134 6034ff-603519 GetSystemInfo 135 60355d-6035a6 VirtualAlloc call 60384b 134->135 136 60351f-603557 134->136 140 60368c-603691 call 603695 135->140 141 6035ac-6035d0 call 60384b 135->141 136->135 148 603693-603694 140->148 141->140 147 6035d6-6035fa call 60384b 141->147 147->140 151 603600-603624 call 60384b 147->151 151->140 154 60362a-603637 151->154 155 60365d-603674 call 60384b 154->155 156 60363d-603658 154->156 159 603679-60367b 155->159 160 603687 156->160 159->140 161 603681 159->161 160->148 161->160
        APIs
        • GetSystemInfo.KERNELBASE(?,-11EA5FEC), ref: 0060350B
        • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004), ref: 0060356C
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AllocInfoSystemVirtual
        • String ID:
        • API String ID: 3440192736-0
        • Opcode ID: 4af632a7e565637fd7b40c90e0d05ed32e5ceb4f435ca7c3259a87bc479ac9d4
        • Instruction ID: 6a42d0aedb62269552cd65eaa84e9126e04a9a6e19cb3a039a5b9122af0208aa
        • Opcode Fuzzy Hash: 4af632a7e565637fd7b40c90e0d05ed32e5ceb4f435ca7c3259a87bc479ac9d4
        • Instruction Fuzzy Hash: A24150B1940216EEF729DF608C05BD7B7ADFF58741F1040A6B203DAAC2E7B196D487A4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID:
        • String ID: !!iH
        • API String ID: 0-3430752988
        • Opcode ID: 54521641a1027243b436c47cb0607a224afa3aa5b952038f992c526b27bdb426
        • Instruction ID: 674de83f56a6aa592520747a62db97739ee2c4d6df250995d683ba5c696dead5
        • Opcode Fuzzy Hash: 54521641a1027243b436c47cb0607a224afa3aa5b952038f992c526b27bdb426
        • Instruction Fuzzy Hash: 7FE08CF13085958ACB1BAF24A801BAA7719DF40B04FD0411AFA859AA89CB2D1D5687DA

        Control-flow Graph

        APIs
        • LoadLibraryExW.KERNEL32(?,?,?), ref: 005F4F7C
        • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 005F4F90
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: .dll$.exe$1002
        • API String ID: 1029625771-847511843
        • Opcode ID: d358cce6f5ee6ede5e6d5c9632931a1a9ecdf6906fb58f09f0efb0eb0fe08ddb
        • Instruction ID: a1c466c625401f1b2403940d2e554e26f73c22331722649c86866e803f70f65b
        • Opcode Fuzzy Hash: d358cce6f5ee6ede5e6d5c9632931a1a9ecdf6906fb58f09f0efb0eb0fe08ddb
        • Instruction Fuzzy Hash: BB318A7180420EEFDF24AF54D808ABE7F7AFF48340F104159FB0986260D7799AA0DE52

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 40 5f5371-5f5382 call 5f4cd5 43 5f538d-5f5396 call 5f3798 40->43 44 5f5388 40->44 51 5f539c-5f53a8 call 5f3eaa 43->51 52 5f53ca-5f53d1 43->52 45 5f5421-5f5425 44->45 47 5f542b-5f5434 GetModuleHandleW 45->47 48 5f5439-5f543c GetModuleHandleA 45->48 50 5f5442 47->50 48->50 54 5f544c-5f544e 50->54 58 5f53ad-5f53af 51->58 55 5f541c call 5f3843 52->55 56 5f53d7-5f53de 52->56 55->45 56->55 59 5f53e4-5f53eb 56->59 58->55 60 5f53b5-5f53ba 58->60 59->55 61 5f53f1-5f53f8 59->61 60->55 62 5f53c0-5f5447 call 5f3843 60->62 61->55 63 5f53fe-5f5412 61->63 62->54 63->55
        APIs
        • GetModuleHandleW.KERNEL32(?,?,?,?,005F5303,?,00000000,00000000), ref: 005F542E
        • GetModuleHandleA.KERNEL32(00000000,?,?,?,005F5303,?,00000000,00000000), ref: 005F543C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: HandleModule
        • String ID: .dll
        • API String ID: 4139908857-2738580789
        • Opcode ID: 767756e302530157aedaf233e3189484ba19d8e93d0699ad953984e4bc3ff3c1
        • Instruction ID: b563ce36750847a64c68d86e40a0fb73481e966c60bb2b09e6e71caf88c665bf
        • Opcode Fuzzy Hash: 767756e302530157aedaf233e3189484ba19d8e93d0699ad953984e4bc3ff3c1
        • Instruction Fuzzy Hash: F8112E30105A0EEAEF31DF54C80D77D7EB1BF40386F145225BB0285496E7BD9AE4DAA2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 67 5f7ccb-5f7cd9 68 5f7cdf-5f7ce6 67->68 69 5f7ceb 67->69 70 5f7cf2-5f7d08 call 5f3798 call 5f3efc 68->70 69->70 75 5f7d0e-5f7d1c call 5f3eaa 70->75 76 5f7d27 70->76 81 5f7d33-5f7d38 75->81 82 5f7d22 75->82 78 5f7d2b-5f7d2e 76->78 80 5f7d5e-5f7d65 call 5f3843 78->80 84 5f7d4f-5f7d52 GetFileAttributesA 81->84 85 5f7d3e-5f7d4a GetFileAttributesW 81->85 82->78 87 5f7d58-5f7d59 84->87 85->87 87->80
        APIs
        • GetFileAttributesW.KERNELBASE(00E503CC,-11EA5FEC), ref: 005F7D44
        • GetFileAttributesA.KERNEL32(00000000,-11EA5FEC), ref: 005F7D52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID: @
        • API String ID: 3188754299-2726393805
        • Opcode ID: 0736ebec810bba124c9c73f2f074c6cae60598d96019467a91e80b456514a9f8
        • Instruction ID: 00a79bb6edd6ae054260590a379bb353316cd5e3daa04af49fda5dfe3765e74e
        • Opcode Fuzzy Hash: 0736ebec810bba124c9c73f2f074c6cae60598d96019467a91e80b456514a9f8
        • Instruction Fuzzy Hash: 3B014B7010820DFAEF21AF68C90D7BC7E71BF48340F604125E702A94A1C3B89B92EA40

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 88 5f3d4b-5f3d7b 90 5f3ea6-5f3ea7 88->90 91 5f3d81-5f3d96 88->91 91->90 93 5f3d9c-5f3da0 91->93 94 5f3da6-5f3db8 PathAddExtensionA 93->94 95 5f3dc2-5f3dc9 93->95 100 5f3dc1 94->100 96 5f3dcf-5f3dde call 5f39ec 95->96 97 5f3deb-5f3df2 95->97 106 5f3de3-5f3de5 96->106 98 5f3df8-5f3dff 97->98 99 5f3e34-5f3e3b 97->99 102 5f3e18-5f3e27 call 5f39ec 98->102 103 5f3e05-5f3e0e 98->103 104 5f3e5d-5f3e64 99->104 105 5f3e41-5f3e57 call 5f39ec 99->105 100->95 112 5f3e2c-5f3e2e 102->112 103->102 107 5f3e14 103->107 110 5f3e6a-5f3e80 call 5f39ec 104->110 111 5f3e86-5f3e8d 104->111 105->90 105->104 106->90 106->97 107->102 110->90 110->111 111->90 115 5f3e93-5f3ea0 call 5f3a25 111->115 112->90 112->99 115->90
        APIs
        • PathAddExtensionA.KERNELBASE(?,00000000), ref: 005F3DAD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: ExtensionPath
        • String ID: \\?\
        • API String ID: 158807944-4282027825
        • Opcode ID: 66cde97e5b6e88c05fe61f7876ca5f3c8f1e09e8e1c1fdd468bf3c0515e0170c
        • Instruction ID: c8f35d7ed2361f27c964347761caf0231e36a590208262b472c8a594aceb57cc
        • Opcode Fuzzy Hash: 66cde97e5b6e88c05fe61f7876ca5f3c8f1e09e8e1c1fdd468bf3c0515e0170c
        • Instruction Fuzzy Hash: C831F93690020EFFEF219F94C809FAEBB7ABF49744F000154FB01A5060D37A9A65DB54

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 119 5f545a-5f546d call 5f3798 122 5f5473-5f547f call 5f3eaa 119->122 123 5f54b0-5f54c4 call 5f3843 GetModuleHandleExA 119->123 126 5f5484-5f5486 122->126 129 5f54ce-5f54d0 123->129 126->123 128 5f548c-5f5493 126->128 130 5f549c-5f54c9 call 5f3843 128->130 131 5f5499 128->131 130->129 131->130
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 005F54BE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CurrentHandleModuleSleepThread
        • String ID: .dll
        • API String ID: 683542999-2738580789
        • Opcode ID: e984ccfbc9ac7d0ad81b90843ab27b5b5f7f134f05925d6e4ae0c1876f6c7d4b
        • Instruction ID: 79c60ac95fa5c07cef80b8483623f0f6bd9e21292fa84b73b94ba1b908a737ef
        • Opcode Fuzzy Hash: e984ccfbc9ac7d0ad81b90843ab27b5b5f7f134f05925d6e4ae0c1876f6c7d4b
        • Instruction Fuzzy Hash: EFF06D71101709BFEF00AF54C84EAB93FA1BF48341F108025FF0989052E339C6A0AA11

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 162 5f7ee7-5f7ef5 163 5f7efb-5f7f02 162->163 164 5f7f07 162->164 165 5f7f0e-5f7f1a call 5f3798 163->165 164->165 168 5f7f35-5f7f45 call 5f7e99 165->168 169 5f7f20-5f7f2a call 5f7df4 165->169 175 5f7f4b-5f7f52 168->175 176 5f7f57-5f7f65 call 5f3eaa 168->176 169->168 174 5f7f30 169->174 177 5f7f76-5f7f7b 174->177 175->177 176->177 182 5f7f6b-5f7f6c call 5f56ee 176->182 180 5f7fa4-5f7fb9 CreateFileA 177->180 181 5f7f81-5f7f9f CreateFileW 177->181 183 5f7fbf-5f7fc0 180->183 181->183 186 5f7f71 182->186 185 5f7fc5-5f7fcc call 5f3843 183->185 186->185
        APIs
        • CreateFileW.KERNELBASE(00E503CC,?,?,-11EA5FEC,?,?,?,-11EA5FEC,?), ref: 005F7F99
          • Part of subcall function 005F7E99: IsBadWritePtr.KERNEL32(?,00000004), ref: 005F7EA7
        • CreateFileA.KERNEL32(?,?,?,-11EA5FEC,?,?,?,-11EA5FEC,?), ref: 005F7FB9
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CreateFile$Write
        • String ID:
        • API String ID: 1125675974-0
        • Opcode ID: 57355da21b1257838b4dee67f565a048a295ddb598db9d8b1fff1a30168a3c4a
        • Instruction ID: a4ea9e30aa5f0d9ad21e20c36616a69e841600611a30d52acfea7fe044c5fe60
        • Opcode Fuzzy Hash: 57355da21b1257838b4dee67f565a048a295ddb598db9d8b1fff1a30168a3c4a
        • Instruction Fuzzy Hash: 5511D33200814EFBEF22AFA4CC09BA93E72BF4C344F148556FA0565465D77A8AA1EB51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 189 5f7853-5f7869 call 5f3798 GetCurrentProcess 192 5f786f-5f7872 189->192 193 5f78ab-5f78cd call 5f3843 DuplicateHandle 189->193 192->193 194 5f7878-5f787b 192->194 199 5f78d7-5f78d9 193->199 194->193 196 5f7881-5f7894 call 5f35f2 194->196 196->193 201 5f789a-5f78d2 call 5f55f0 call 5f3843 196->201 201->199
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        • GetCurrentProcess.KERNEL32(-11EA5FEC), ref: 005F7860
        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 005F78C6
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: Current$DuplicateHandleProcessSleepThread
        • String ID:
        • API String ID: 2846201637-0
        • Opcode ID: 055707be91383bd63930a3954f8f357af691e4a59acac41ad1839f54413e0430
        • Instruction ID: ca8d9613e9bbf68d4e9f106240d8f45af477358c7b2a6e233a64b4aa836d808a
        • Opcode Fuzzy Hash: 055707be91383bd63930a3954f8f357af691e4a59acac41ad1839f54413e0430
        • Instruction Fuzzy Hash: DB01D67210454EFA9F12AFA8DC4DCAE3F65BF887907004525FA15A4021D739C661EB61

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 206 5f3798-5f37ae GetCurrentThreadId 207 5f37b0-5f37bc 206->207 208 5f37f7-5f3804 call 5fa617 207->208 209 5f37c2-5f37c4 207->209 209->208 210 5f37ca-5f37d1 209->210 213 5f37d7-5f37de 210->213 214 5f37e6-5f37f2 Sleep 210->214 213->214 215 5f37e4 213->215 214->207 215->214
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 005F37A7
        • Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CurrentSleepThread
        • String ID:
        • API String ID: 1164918020-0
        • Opcode ID: 6a5a9148d2602abf1df91ff887c6d467fcb48ca908740165de8a2810141acde1
        • Instruction ID: f4b95362c08be140329577fa228b5ff51b062a0c950c4b4d322fd7f0a3cb60e4
        • Opcode Fuzzy Hash: 6a5a9148d2602abf1df91ff887c6d467fcb48ca908740165de8a2810141acde1
        • Instruction Fuzzy Hash: B3F0B4F150610DEFEB21AF64C84977F7AB4FF44309F200039D20285081D77A2B89DA92

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 225 603f2b-603f39 226 603f5c-603f66 call 603dc0 225->226 227 603f3f-603f51 225->227 232 603f71-603f7a 226->232 233 603f6c 226->233 227->226 231 603f57 227->231 234 6040bb-6040bd 231->234 235 603f80-603f87 232->235 236 603f92-603f99 232->236 233->234 235->236 237 603f8d 235->237 238 603fa4-603fb4 236->238 239 603f9f 236->239 237->234 238->234 240 603fba-603fc6 call 603e95 238->240 239->234 243 603fc9-603fcd 240->243 243->234 244 603fd3-603fdd 243->244 245 603fe3-603ff6 244->245 246 604004-604007 244->246 245->246 251 603ffc-603ffe 245->251 247 60400a-60400d 246->247 249 6040b3-6040b6 247->249 250 604013-60401a 247->250 249->243 252 604020-604026 250->252 253 604048-604061 250->253 251->246 251->249 254 604043 252->254 255 60402c-604031 252->255 259 604067-604075 253->259 260 60407a-604082 VirtualProtect 253->260 256 6040ab-6040ae 254->256 255->254 258 604037-60403d 255->258 256->247 258->253 258->254 261 604088-60408b 259->261 260->261 261->256 263 604091-6040aa 261->263 263->256
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e6cb138a0f92e84c3db53b5c860eff399ddc1db7d1617c536a5d218000c78a4f
        • Instruction ID: f45ced6af416c23ba221a7b4cc964c0bb1379f217536d6a9b411f34c8b1cfe3b
        • Opcode Fuzzy Hash: e6cb138a0f92e84c3db53b5c860eff399ddc1db7d1617c536a5d218000c78a4f
        • Instruction Fuzzy Hash: 914159B294020AAFDB38CF10C944BAB77B6FF00311F248455EB03AA6C1C771AD91DB95

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 265 5f5ed2-5f5ee3 266 5f5ee9-5f5efd call 5f3876 265->266 267 5f5f12-5f5f1b call 5f3876 265->267 278 5f6000 266->278 279 5f5f03-5f5f11 266->279 271 5f5ff8-5f5ffb call 5f389b 267->271 272 5f5f21-5f5f32 call 5f56b4 267->272 271->278 280 5f5f38-5f5f3c 272->280 281 5f5f52-5f5f91 CreateFileA 272->281 282 5f6007-5f600b 278->282 279->267 283 5f5f4f 280->283 284 5f5f42-5f5f4e call 5fa73c 280->284 285 5f5f97-5f5fb4 281->285 286 5f5fb5-5f5fb8 281->286 283->281 284->283 285->286 289 5f5fbe-5f5fd5 call 5f35b8 286->289 290 5f5feb-5f5ff3 call 5f5543 286->290 289->282 297 5f5fdb-5f5fe6 call 5f55b1 289->297 290->278 297->278
        APIs
        • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 005F5F87
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: a3cf3b89c394c8dcb5134ac4727d1a35698555d192e19ab065296e0fc62a14a5
        • Instruction ID: 11ccb049afff4c168cf582b914dbf67899f428afa1e89f2817dcb333df3581d2
        • Opcode Fuzzy Hash: a3cf3b89c394c8dcb5134ac4727d1a35698555d192e19ab065296e0fc62a14a5
        • Instruction Fuzzy Hash: 3D315EB1500609FAEF209F64DC49FADBFB8FB44314F208169F705AA191E7799A51CB10

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 300 5f56ee-5f56fd call 5f3876 303 5f5803 300->303 304 5f5703-5f5714 call 5f56b4 300->304 306 5f580a-5f580e 303->306 308 5f571a-5f571e 304->308 309 5f5734-5f577a CreateFileA 304->309 310 5f5724-5f5730 call 5fa73c 308->310 311 5f5731 308->311 312 5f57c5-5f57c8 309->312 313 5f5780-5f57a1 309->313 310->311 311->309 314 5f57ce-5f57e5 call 5f35b8 312->314 315 5f57fb-5f57fe call 5f5543 312->315 313->312 321 5f57a7-5f57c4 313->321 314->306 323 5f57eb-5f57f6 call 5f55b1 314->323 315->303 321->312 323->303
        APIs
        • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 005F5770
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: fdd7ce81fd2225799d68ee9601087092e8b686a2ad3ea79382d07a16b615fb6e
        • Instruction ID: 085833b2e1f2bd479c6223b8c1bb05d125abcd2a4c98e7f19008a5e77bceb816
        • Opcode Fuzzy Hash: fdd7ce81fd2225799d68ee9601087092e8b686a2ad3ea79382d07a16b615fb6e
        • Instruction Fuzzy Hash: 1131C371540609FFEB20AF68DC49FA97BB8FB44764F204225F711AE0D1E3B9A5428B50

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 327 603c78-603c87 328 603c93-603ca7 327->328 329 603c8d 327->329 331 603d65-603d67 328->331 332 603cad-603cb7 328->332 329->328 333 603d54-603d60 332->333 334 603cbd-603cc7 332->334 333->328 334->333 335 603ccd-603cd7 334->335 335->333 336 603cdd-603cec 335->336 338 603cf2 336->338 339 603cf7-603cfc 336->339 338->333 339->333 340 603d02-603d11 339->340 340->333 341 603d17-603d2e GetModuleFileNameA 340->341 341->333 342 603d34-603d42 call 603bd4 341->342 345 603d48 342->345 346 603d4d-603d4f 342->346 345->333 346->331
        APIs
        • GetModuleFileNameA.KERNELBASE(?,?,0000028A,?,?), ref: 00603D25
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: FileModuleName
        • String ID:
        • API String ID: 514040917-0
        • Opcode ID: 7aff4e077d6eb09092ebc333b76255e4bfae00cc0dcbc0b4f6145b81f132f98b
        • Instruction ID: 8fedb8c967396ac657f4a83ba547753fab79da6eca5693434bfdb8bdefb01672
        • Opcode Fuzzy Hash: 7aff4e077d6eb09092ebc333b76255e4bfae00cc0dcbc0b4f6145b81f132f98b
        • Instruction Fuzzy Hash: 8811E671A812349FEB348A15CC48BEBB77DEF44756F1040A5E805A63C1D7709FC98BA2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 347 4eb0d41-4eb0d46 348 4eb0d48-4eb0d4b 347->348 349 4eb0d4c-4eb0d97 347->349 348->349 351 4eb0d99-4eb0d9c 349->351 352 4eb0d9f-4eb0da3 349->352 351->352 353 4eb0dab-4eb0dda OpenSCManagerW 352->353 354 4eb0da5-4eb0da8 352->354 355 4eb0ddc-4eb0de2 353->355 356 4eb0de3-4eb0df7 353->356 354->353 355->356
        APIs
        • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04EB0DCD
        Memory Dump Source
        • Source File: 00000000.00000002.1523645951.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4eb0000_file.jbxd
        Similarity
        • API ID: ManagerOpen
        • String ID:
        • API String ID: 1889721586-0
        • Opcode ID: adce696966cece80d728da6cb8bab1a0931c3ea0f66359d42c1539094e89edf8
        • Instruction ID: 2f9497e8dbd11780c8086463d1e5c586eb23efee31fb47f4bd152e3e3d2c4690
        • Opcode Fuzzy Hash: adce696966cece80d728da6cb8bab1a0931c3ea0f66359d42c1539094e89edf8
        • Instruction Fuzzy Hash: B82138B6C002099FDB50DF99D885BDFFBF5EB88320F14822AD908AB244D734A541CFA5
        APIs
        • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04EB0DCD
        Memory Dump Source
        • Source File: 00000000.00000002.1523645951.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4eb0000_file.jbxd
        Similarity
        • API ID: ManagerOpen
        • String ID:
        • API String ID: 1889721586-0
        • Opcode ID: 0f15a9cbaa10da9e6188e597687c21e0ee1e886668b31dffc729b0a1b3f71052
        • Instruction ID: 5d4146de5d9b6901bcbfd7bab5f3b4d3f9426496dc5f141d6ceee3045edda801
        • Opcode Fuzzy Hash: 0f15a9cbaa10da9e6188e597687c21e0ee1e886668b31dffc729b0a1b3f71052
        • Instruction Fuzzy Hash: BF2127B6C012199FCB50DF99D885BDEFBF5FB88310F14821AD908AB244D734A541CFA4
        APIs
        • ControlService.ADVAPI32(?,?,?), ref: 04EB1580
        Memory Dump Source
        • Source File: 00000000.00000002.1523645951.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4eb0000_file.jbxd
        Similarity
        • API ID: ControlService
        • String ID:
        • API String ID: 253159669-0
        • Opcode ID: 61e0bf84088b2da965d07a0e22b6a72dd06e225f7735bd67548cf0546e401e4a
        • Instruction ID: 3a278ea6c965ab074636f2a939702a74dd2aa8118b7175ea32992166d01070d9
        • Opcode Fuzzy Hash: 61e0bf84088b2da965d07a0e22b6a72dd06e225f7735bd67548cf0546e401e4a
        • Instruction Fuzzy Hash: 5B2117B1D003499FDB20CF9AC545BDEFBF4EB48360F108029E959A7250D778AA44CFA5
        APIs
        • ControlService.ADVAPI32(?,?,?), ref: 04EB1580
        Memory Dump Source
        • Source File: 00000000.00000002.1523645951.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4eb0000_file.jbxd
        Similarity
        • API ID: ControlService
        • String ID:
        • API String ID: 253159669-0
        • Opcode ID: 7579ecffd1e9b48998067eac1446c9e93c096d1ee0ed9521e66c389ba957325a
        • Instruction ID: 35547871479fa23a3686f43b212fa2af2b930562c73a4ad3641b42ea51908701
        • Opcode Fuzzy Hash: 7579ecffd1e9b48998067eac1446c9e93c096d1ee0ed9521e66c389ba957325a
        • Instruction Fuzzy Hash: D21129B1D003498FDB10CF9AC445BDEFBF4EB48360F108029E959A3250D378A544CFA5
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        • MapViewOfFileEx.KERNELBASE(?,?,?,?,?,?,-11EA5FEC), ref: 005F8AA6
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CurrentFileSleepThreadView
        • String ID:
        • API String ID: 2270672837-0
        • Opcode ID: f2b516849dfdde1398d590fb759b0dc2149e7396227d76f7eae7f2ffd73fd130
        • Instruction ID: 5c364a6f5157b228cbb9c923c1fbfa3770ee71def15c7c6a0e584adef3982eec
        • Opcode Fuzzy Hash: f2b516849dfdde1398d590fb759b0dc2149e7396227d76f7eae7f2ffd73fd130
        • Instruction Fuzzy Hash: 4D11937210010EFACF12AFA4DD099BE3E66FF89350B084516BA5255021DB3AD671EB61
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CurrentSleepThread
        • String ID:
        • API String ID: 1164918020-0
        • Opcode ID: 42299a6b55c5960796dc5f4ab24401f8772f762affbf9add79e68cedbbc36b97
        • Instruction ID: 3df5f9aac81c5342df96ec6f9eaf880d2a70029449f12abc17f6bc0b691f8c1e
        • Opcode Fuzzy Hash: 42299a6b55c5960796dc5f4ab24401f8772f762affbf9add79e68cedbbc36b97
        • Instruction Fuzzy Hash: B5113C7150020EEBDF11AFA4C80DABE3F65BF84384F544820FB1156061DB7DCA61EB51
        APIs
        • ImpersonateLoggedOnUser.KERNELBASE ref: 04EB1367
        Memory Dump Source
        • Source File: 00000000.00000002.1523645951.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4eb0000_file.jbxd
        Similarity
        • API ID: ImpersonateLoggedUser
        • String ID:
        • API String ID: 2216092060-0
        • Opcode ID: b29acd4bf95d22bb48d95b92af5714dfac964c8f51bf872c6987491297e639da
        • Instruction ID: 53793e9e0f23d07b991eb8bc28bcfc3ad02913e10a3ef3a1500f22f8087c72b5
        • Opcode Fuzzy Hash: b29acd4bf95d22bb48d95b92af5714dfac964c8f51bf872c6987491297e639da
        • Instruction Fuzzy Hash: 981146B1C003498FDB10DF9AD545BEEFBF4EB48320F108429D558A3640D738A541CFA1
        APIs
        • ImpersonateLoggedOnUser.KERNELBASE ref: 04EB1367
        Memory Dump Source
        • Source File: 00000000.00000002.1523645951.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4eb0000_file.jbxd
        Similarity
        • API ID: ImpersonateLoggedUser
        • String ID:
        • API String ID: 2216092060-0
        • Opcode ID: b4b57853af7037d9d92e9a83111aa12c1abbebd9dc2209cbe1f9f14f4ed8a985
        • Instruction ID: 017539a0a6a3274e6e5ef3b1f047af211b5d2c90a2cbd269aef4a63fae5c9af5
        • Opcode Fuzzy Hash: b4b57853af7037d9d92e9a83111aa12c1abbebd9dc2209cbe1f9f14f4ed8a985
        • Instruction Fuzzy Hash: 8C11F5B18003498FDB20DF9AC945BEEFBF4EB48324F14842AD558A3650D778A944CFA5
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        • ReadFile.KERNELBASE(?,00000000,?,00000400,?,-11EA5FEC,?,?,005F5E1A,?,?,00000400,?,00000000,?,00000000), ref: 005F8157
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CurrentFileReadSleepThread
        • String ID:
        • API String ID: 1253362762-0
        • Opcode ID: fdc362f6b7eaf24042e9edba3acafef5fc101d205e60747409a88c69537886df
        • Instruction ID: 17bf18e208faf43c867ebad9d4cf432eab3cce03c17906f4fbb3624f2fe16a3c
        • Opcode Fuzzy Hash: fdc362f6b7eaf24042e9edba3acafef5fc101d205e60747409a88c69537886df
        • Instruction Fuzzy Hash: 80F0B67210010EEBDF126F98DC09DAA3F66BB99380B004621BB0159021DB3AC6A2EB61
        APIs
        • GetProcAddress.KERNEL32(005F4884,005F4884), ref: 005F5119
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AddressProc
        • String ID:
        • API String ID: 190572456-0
        • Opcode ID: d605b3ed7f71941c24c6231dd5f3f45cef86bd81f4ee5a297b415b4f1b404b5a
        • Instruction ID: fa3f7799a63d8cf84225c40e3f7c4888b9794aa1eea682a4988b1d4c43c4b173
        • Opcode Fuzzy Hash: d605b3ed7f71941c24c6231dd5f3f45cef86bd81f4ee5a297b415b4f1b404b5a
        • Instruction Fuzzy Hash: 33E0C93110150EBA9F117AA5D80D97E2F5ABE94380B108121BB5654022FA7DD661EA51
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 0ccf72eb9edc268931673b985631a7562bcf11550174cad31b0e2c0e3f43d8e0
        • Instruction ID: 85e46408190150b3a84673d54a5292e5da04f6384ad1378221d5e45f721495b2
        • Opcode Fuzzy Hash: 0ccf72eb9edc268931673b985631a7562bcf11550174cad31b0e2c0e3f43d8e0
        • Instruction Fuzzy Hash: A6D0A9F360CA04AFC7412F5884543ACBBD4FF89390F360C38E282C7A00EE704840878A
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: lstrcmpi
        • String ID:
        • API String ID: 1586166983-0
        • Opcode ID: 358537dd5bee54dc269a464df033494d39f0e08e8f220f8017984f3faea2d895
        • Instruction ID: 5092050e31e6bc880097f8483bae2a3ea446ec836ae8353c0618e94ed2395a49
        • Opcode Fuzzy Hash: 358537dd5bee54dc269a464df033494d39f0e08e8f220f8017984f3faea2d895
        • Instruction Fuzzy Hash: AE01D232A0410EFFEF119FA8CD09DAEBF76FF48B40F004165B501A4060D7B68A65DB60
        APIs
        • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,?,?,0060389E,?,?,006035A4,?,?,006035A4,?,?,006035A4), ref: 006038C2
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: b12a4bcc9b022256c34b0a5388b14f78540b78c2708146091538295e84b90df2
        • Instruction ID: 08496138101b44cbddd516e0bee81484fc5404d2f7943f39f0150187d6a26527
        • Opcode Fuzzy Hash: b12a4bcc9b022256c34b0a5388b14f78540b78c2708146091538295e84b90df2
        • Instruction Fuzzy Hash: 92F081B1900205EFE7248F14CD04B9ABBA9FF55762F108065F44A9B692E3B599D0DB90
        APIs
        • VirtualAlloc.KERNELBASE(00000000), ref: 0042E5C7
        Memory Dump Source
        • Source File: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: b0d2211e9fb8dec36bc216b1545eebbaed43aabff9686b73230dfc0e7e393b1a
        • Instruction ID: f94c0f5e3f1550e4287b229a5a42fd1c488a957c563ad35c94d09b5336aca871
        • Opcode Fuzzy Hash: b0d2211e9fb8dec36bc216b1545eebbaed43aabff9686b73230dfc0e7e393b1a
        • Instruction Fuzzy Hash: 86011671508709DFC3449F36955856EBBE0EF84320F65892EE4C586640D3304981CB1B
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        • CloseHandle.KERNELBASE(005F5EAF,-11EA5FEC,?,?,005F5EAF,?), ref: 005F652A
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CloseCurrentHandleSleepThread
        • String ID:
        • API String ID: 4003616898-0
        • Opcode ID: 6cb1f837301953a78455bd318f9f92d4a7e91161df7e2fa43153764db96bd75c
        • Instruction ID: 86ba8233ec800462d7966cef8ae534f7325e5a9f1dc449e114fbd0789a1cf351
        • Opcode Fuzzy Hash: 6cb1f837301953a78455bd318f9f92d4a7e91161df7e2fa43153764db96bd75c
        • Instruction Fuzzy Hash: 20E048F224510FB5EF107BBCE80EC7E1F55BFD57407404531B302A5405DA6DC7919261
        APIs
        • VirtualAlloc.KERNELBASE(00000000), ref: 0042F700
        Memory Dump Source
        • Source File: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: e72f2755de823a4bba41177fe1e982f99936959111b595e7fdc421159eda6fef
        • Instruction ID: 628f8b3511a66b9c2d262af177e02e73ba5623fc44f95b9e6e09f099617c2cb8
        • Opcode Fuzzy Hash: e72f2755de823a4bba41177fe1e982f99936959111b595e7fdc421159eda6fef
        • Instruction Fuzzy Hash: 10E06DF5A0C1058FE7086F24D91573DBBE2FB50710F50852DDCC246748E6720C66CA0B
        APIs
        • CloseHandle.KERNELBASE(?,?,005F3637,?,?), ref: 005F55B7
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CloseHandle
        • String ID:
        • API String ID: 2962429428-0
        • Opcode ID: 0e696b786f3f1f6b23ae72c00d196715a7a51c2c7cf1a2099362c29344b3d316
        • Instruction ID: ff2466ac025636ac8fa8138088e11b1ded7a003b77add927c62003d616c47423
        • Opcode Fuzzy Hash: 0e696b786f3f1f6b23ae72c00d196715a7a51c2c7cf1a2099362c29344b3d316
        • Instruction Fuzzy Hash: D2B0923100054DBBCF02BF65DC0A84DBFAABF56398B008120BA0644831DB76EAA09B90
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
        • GetSystemTime.KERNEL32(?,-11EA5FEC), ref: 005F791A
        • GetFileTime.KERNEL32(?,?,?,?,-11EA5FEC), ref: 005F795D
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: Time$CurrentFileSleepSystemThread
        • String ID:
        • API String ID: 3818558864-0
        • Opcode ID: ce16818507b60fe40c8ca7fcbfd8233354de813740b81e1cde619a8717a5d2c7
        • Instruction ID: 4f7cfee7749f24f6ca6e795d4e8551b13051a24a6dc528cb301cb829ec5b2fc3
        • Opcode Fuzzy Hash: ce16818507b60fe40c8ca7fcbfd8233354de813740b81e1cde619a8717a5d2c7
        • Instruction Fuzzy Hash: 6F01163220404EFBDF216F69ED0CDAE7F75FFC9720B108225F60295061C77A8AA1DA60
        APIs
        • CryptVerifySignatureA.ADVAPI32(?,?,?,?,?,?), ref: 005F87EA
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CryptSignatureVerify
        • String ID:
        • API String ID: 1015439381-0
        • Opcode ID: 4c0debea577b16dafc2462d6c25f0846d9dd0a5d60269359713866d9603ff9dc
        • Instruction ID: 31e0e0aded7db51f26b2a28fb63bd05aae75f8b06d58f69f5f5746066d5698a0
        • Opcode Fuzzy Hash: 4c0debea577b16dafc2462d6c25f0846d9dd0a5d60269359713866d9603ff9dc
        • Instruction Fuzzy Hash: FDF0F83260120EEFCF01DF94C944AAD7FB2FF19314B208525FA0596611D776DAA1EF40
        Memory Dump Source
        • Source File: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 79d1922d40a458750ce2693da1406de9a118d80294ff7b262c81a513c59ae3cb
        • Instruction ID: 599ffbc7252288fce73ac2bc39234bc79b1ad15bcaf2551e392fc0df6f67d3ba
        • Opcode Fuzzy Hash: 79d1922d40a458750ce2693da1406de9a118d80294ff7b262c81a513c59ae3cb
        • Instruction Fuzzy Hash: 4301F7F618413A9DCB12CE465E045EF7A2DFA43370B704027F802D7902D3E60D1695A8
        Memory Dump Source
        • Source File: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a19e9601f31df17d8e3b00613da5d1011c11311799d279fc7aac63243cfce2de
        • Instruction ID: 029f5642e81803bb383ba11a85dd5b86fcfbc1e1d0d0afc2e847087e9b4afbe5
        • Opcode Fuzzy Hash: a19e9601f31df17d8e3b00613da5d1011c11311799d279fc7aac63243cfce2de
        • Instruction Fuzzy Hash: CEE04F360041019ED700DF54C84599FFBF8FF19320F608445E444C7622C3394941CB29
        APIs
          • Part of subcall function 005F3798: GetCurrentThreadId.KERNEL32 ref: 005F37A7
          • Part of subcall function 005F3798: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005F37EA
          • Part of subcall function 005F7E99: IsBadWritePtr.KERNEL32(?,00000004), ref: 005F7EA7
        • wsprintfA.USER32 ref: 005F6E61
        • LoadImageA.USER32(?,?,?,?,?,?), ref: 005F6F25
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: CurrentImageLoadSleepThreadWritewsprintf
        • String ID: %8x$%8x
        • API String ID: 2375920415-2046107164
        • Opcode ID: b5f8a85fbfeba9876a8eaf053a0135ca439cb71a479b982319b992b9e2027fc9
        • Instruction ID: ed3087df266d59b97d6bfa9d3142bec8bf81b18b95abb8660a0baa40202d1a25
        • Opcode Fuzzy Hash: b5f8a85fbfeba9876a8eaf053a0135ca439cb71a479b982319b992b9e2027fc9
        • Instruction Fuzzy Hash: B831047290020EFBDF119F94DC49EAEBF79FF88700F108125F611A61A1D7759A61DBA0
        APIs
        • GetFileAttributesExW.KERNEL32(00E503CC,00004020,00000000,-11EA5FEC), ref: 005F7AD9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1520938934.00000000005EF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
        • Associated: 00000000.00000002.1520495731.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520513527.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520529871.0000000000426000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520546382.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520566057.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520666443.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520684379.0000000000585000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520706433.000000000059F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520724269.00000000005A1000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005A3000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520739644.00000000005AB000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520777482.00000000005BF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520796120.00000000005C0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520812202.00000000005C2000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520830340.00000000005C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520847098.00000000005C5000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520864285.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520884362.00000000005DC000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520902349.00000000005DD000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520921466.00000000005E4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520971444.0000000000614000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1520993092.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521012970.000000000061C000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521032405.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521058206.0000000000629000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521074231.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521099371.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521119820.0000000000639000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521137554.0000000000641000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521168084.0000000000645000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521189997.0000000000646000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521209486.0000000000649000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521223927.000000000064A000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521240085.0000000000650000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521259585.0000000000651000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521276632.0000000000653000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521301604.0000000000672000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521323368.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521351636.00000000006A4000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521374196.00000000006A5000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006AF000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521398433.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1521436972.00000000006C6000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_420000_file.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID: @
        • API String ID: 3188754299-2726393805
        • Opcode ID: 475a9f9d785a43e060fa38d6714f8e0514261fd44e4afde4cdcbff8d06d6b6c0
        • Instruction ID: b44386907ca2c3a642fe199bb325192834900d1d12755b69e4785bea8c251072
        • Opcode Fuzzy Hash: 475a9f9d785a43e060fa38d6714f8e0514261fd44e4afde4cdcbff8d06d6b6c0
        • Instruction Fuzzy Hash: 5F317CB550460AEFDF259F44C8487AEBFB1FF08300F008519E69567650C3B8A6A5CB80