Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1528603
MD5:6e6fb447eceaa1eb52c8777a6f9aa897
SHA1:3b373650d36a7de08168cdf7eff08e67b3b677c3
SHA256:474f1a30307ad485850abf5f66db96c90f84d3f745c3b70130ec509be36af4be
Tags:exeuser-Bitsight
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 3356 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 6E6FB447ECEAA1EB52C8777A6F9AA897)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["dissapoiznw.stor", "eaglepawnoy.stor", "mobbipenju.stor", "bathdoomgaz.stor", "licendfilteo.site", "spirittunek.stor", "clearancek.site", "studennotediw.stor"], "Build id": "4SD0y4--legendaryy"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:02.148343+020020564771Domain Observed Used for C2 Detected192.168.2.5646331.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:01.925315+020020564711Domain Observed Used for C2 Detected192.168.2.5574871.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:01.961797+020020564811Domain Observed Used for C2 Detected192.168.2.5612701.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:01.947697+020020564831Domain Observed Used for C2 Detected192.168.2.5634721.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:02.320127+020020564731Domain Observed Used for C2 Detected192.168.2.5532371.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:01.938034+020020564851Domain Observed Used for C2 Detected192.168.2.5522291.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:02.309637+020020564751Domain Observed Used for C2 Detected192.168.2.5623391.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-08T04:12:02.012629+020020564791Domain Observed Used for C2 Detected192.168.2.5551541.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeAvira: detected
    Source: https://steamcommunity.com/profiles/76561199724331900URL Reputation: Label: malware
    Source: file.exe.3356.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["dissapoiznw.stor", "eaglepawnoy.stor", "mobbipenju.stor", "bathdoomgaz.stor", "licendfilteo.site", "spirittunek.stor", "clearancek.site", "studennotediw.stor"], "Build id": "4SD0y4--legendaryy"}
    Source: spirittunek.storeVirustotal: Detection: 13%Perma Link
    Source: licendfilteo.siteVirustotal: Detection: 15%Perma Link
    Source: dissapoiznw.storeVirustotal: Detection: 13%Perma Link
    Source: eaglepawnoy.storeVirustotal: Detection: 17%Perma Link
    Source: studennotediw.storeVirustotal: Detection: 17%Perma Link
    Source: mobbipenju.storeVirustotal: Detection: 13%Perma Link
    Source: bathdoomgaz.storeVirustotal: Detection: 13%Perma Link
    Source: clearancek.siteVirustotal: Detection: 17%Perma Link
    Source: clearancek.siteVirustotal: Detection: 17%Perma Link
    Source: licendfilteo.siteVirustotal: Detection: 15%Perma Link
    Source: file.exeVirustotal: Detection: 49%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: clearancek.site
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: licendfilteo.site
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: spirittunek.stor
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: bathdoomgaz.stor
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: studennotediw.stor
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: dissapoiznw.stor
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: eaglepawnoy.stor
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: mobbipenju.stor
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: clearancek.site
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
    Source: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpString decryptor: 4SD0y4--legendaryy
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49704 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_0024D110
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_0024D110
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], C274D4CAh0_2_002863B8
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00285700
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 27BAF212h0_2_0028695B
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 53F09CFAh0_2_002899D0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_0024FCA0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]0_2_00256F91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then dec ebx0_2_0027F030
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [edx]0_2_00241000
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h0_2_00284040
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_00286094
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_0026D1E1
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00262260
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [esi], ax0_2_00262260
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_002542FC
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebp, eax0_2_0024A300
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi], al0_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+30h]0_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+14h]0_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_0026E40C
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esp], 00000000h0_2_0025B410
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_0026C470
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]0_2_00281440
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0025D457
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], C274D4CAh0_2_002864B8
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 7789B0CBh0_2_00287520
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_00256536
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00269510
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi+25h]0_2_00248590
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_0026E66A
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_0027B650
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]0_2_00287710
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_0026D7AF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]0_2_002867EF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx0_2_002628E9
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 62429966h0_2_00283920
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h0_2_0025D961
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]0_2_002449A0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_00251A3C
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h0_2_00284A40
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]0_2_00245A50
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_00251ACD
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 53F09CFAh0_2_00289B60
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+000006B8h]0_2_0025DB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F8FD61B8h0_2_0025DB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_00270B80
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_00253BE2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+40h]0_2_00251BEE
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], A70A987Fh0_2_0027FC20
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h0_2_00267C00
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h0_2_0026EC48
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_0026AC91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [edx], ax0_2_0026AC91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00289CE0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 9ECF05EBh0_2_00289CE0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], C85F7986h0_2_0026CCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_0026CCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], C85F7986h0_2_0026CCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]0_2_0026DD29
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esp+1Ch], 5E46585Eh0_2_0026FD10
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00288D8A
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, ecx0_2_00254E2A
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00267E60
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00265E70
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, word ptr [ecx]0_2_0026AE57
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]0_2_00246EA0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, word ptr [ebp+00h]0_2_0024BEB0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp byte ptr [ebx], 00000000h0_2_00256EBF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+40h]0_2_00251E93
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]0_2_00250EEC
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax0_2_00269F62
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_0027FF70
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]0_2_00256F91
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], F3285E74h0_2_00287FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00287FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_00248FD0
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [edx], 0000h0_2_0025FFDF
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_00285FD6

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2056481 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dissapoiznw .store) : 192.168.2.5:61270 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056471 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clearancek .site) : 192.168.2.5:57487 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056477 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bathdoomgaz .store) : 192.168.2.5:64633 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056479 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (studennotediw .store) : 192.168.2.5:55154 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056485 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mobbipenju .store) : 192.168.2.5:52229 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056483 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (eaglepawnoy .store) : 192.168.2.5:63472 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056473 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (licendfilteo .site) : 192.168.2.5:53237 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056475 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spirittunek .store) : 192.168.2.5:62339 -> 1.1.1.1:53
    Source: Malware configuration extractorURLs: dissapoiznw.stor
    Source: Malware configuration extractorURLs: eaglepawnoy.stor
    Source: Malware configuration extractorURLs: mobbipenju.stor
    Source: Malware configuration extractorURLs: bathdoomgaz.stor
    Source: Malware configuration extractorURLs: licendfilteo.site
    Source: Malware configuration extractorURLs: spirittunek.stor
    Source: Malware configuration extractorURLs: clearancek.site
    Source: Malware configuration extractorURLs: studennotediw.stor
    Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=9be4736368c59fb55776a050; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type25489Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveTue, 08 Oct 2024 02:12:03 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-ControlYYKq( equals www.youtube.com (Youtube)
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: clearancek.site
    Source: global trafficDNS traffic detected: DNS query: mobbipenju.store
    Source: global trafficDNS traffic detected: DNS query: eaglepawnoy.store
    Source: global trafficDNS traffic detected: DNS query: dissapoiznw.store
    Source: global trafficDNS traffic detected: DNS query: studennotediw.store
    Source: global trafficDNS traffic detected: DNS query: bathdoomgaz.store
    Source: global trafficDNS traffic detected: DNS query: spirittunek.store
    Source: global trafficDNS traffic detected: DNS query: licendfilteo.site
    Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
    Source: file.exe, 00000000.00000002.2073082596.0000000000FB4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071812749.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071927479.0000000000FB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/1
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
    Source: file.exe, 00000000.00000003.2071927479.0000000000FB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/q
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
    Source: file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
    Source: file.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
    Source: file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
    Source: file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
    Source: file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49704 version: TLS 1.2

    System Summary

    barindex
    Source: file.exeStatic PE information: section name:
    Source: file.exeStatic PE information: section name: .rsrc
    Source: file.exeStatic PE information: section name: .idata
    Source: file.exeStatic PE information: section name:
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002502280_2_00250228
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002520300_2_00252030
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002410000_2_00241000
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004070100_2_00407010
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002840400_2_00284040
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E0E10_2_0040E0E1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0028A0D00_2_0028A0D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002451600_2_00245160
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024E1A00_2_0024E1A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003C61EE0_2_003C61EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002471F00_2_002471F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004012540_2_00401254
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004122C30_2_004122C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002412F70_2_002412F7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002782D00_2_002782D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002712D00_2_002712D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024A3000_2_0024A300
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024B3A00_2_0024B3A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002413A30_2_002413A3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002723E00_2_002723E0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004084610_2_00408461
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A4790_2_0040A479
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026C4700_2_0026C470
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002544870_2_00254487
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025049B0_2_0025049B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002764F00_2_002764F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002435B00_2_002435B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002485900_2_00248590
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025C5F00_2_0025C5F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027F6200_2_0027F620
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024164F0_2_0024164F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002886520_2_00288652
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004E96C10_2_004E96C1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002886F00_2_002886F0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041577D0_2_0041577D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003657720_2_00365772
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004108600_2_00410860
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002718600_2_00271860
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024A8500_2_0024A850
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027E8A00_2_0027E8A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0027B8C00_2_0027B8C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002889A00_2_002889A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026098B0_2_0026098B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003FF9CC0_2_003FF9CC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BA0F0_2_0040BA0F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AA1D0_2_0041AA1D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00284A400_2_00284A40
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00287AB00_2_00287AB0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00288A800_2_00288A80
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025DB6F0_2_0025DB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002D7BA50_2_002D7BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00247BF00_2_00247BF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00288C020_2_00288C02
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00286CBF0_2_00286CBF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026CCD00_2_0026CCD0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026DD290_2_0026DD29
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026FD100_2_0026FD10
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00268D620_2_00268D62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0038ADB70_2_0038ADB7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00254E2A0_2_00254E2A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418E560_2_00418E56
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CE6D0_2_0041CE6D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00288E700_2_00288E70
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026AE570_2_0026AE57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024BEB00_2_0024BEB0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00256EBF0_2_00256EBF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002DBF090_2_002DBF09
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024AF100_2_0024AF10
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A3FF90_2_003A3FF9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00287FC00_2_00287FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00248FD00_2_00248FD0
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0024CAA0 appears 48 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0025D300 appears 152 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: file.exeStatic PE information: Section: ZLIB complexity 0.9995939047029703
    Source: file.exeStatic PE information: Section: bkrfjoau ZLIB complexity 0.9945621253330373
    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@9/1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00278220 CoCreateInstance,0_2_00278220
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeVirustotal: Detection: 49%
    Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
    Source: file.exeStatic file information: File size 1900032 > 1048576
    Source: file.exeStatic PE information: Raw size of bkrfjoau is bigger than: 0x100000 < 0x1a6400

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.240000.0.unpack :EW;.rsrc :W;.idata :W; :EW;bkrfjoau:EW;rmllwxbw:EW;.taggant:EW; vs :ER;.rsrc :W;.idata :W; :EW;bkrfjoau:EW;rmllwxbw:EW;.taggant:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
    Source: file.exeStatic PE information: real checksum: 0x1df0eb should be: 0x1dd70b
    Source: file.exeStatic PE information: section name:
    Source: file.exeStatic PE information: section name: .rsrc
    Source: file.exeStatic PE information: section name: .idata
    Source: file.exeStatic PE information: section name:
    Source: file.exeStatic PE information: section name: bkrfjoau
    Source: file.exeStatic PE information: section name: rmllwxbw
    Source: file.exeStatic PE information: section name: .taggant
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049304E push 0FBE3B00h; mov dword ptr [esp], eax0_2_00493076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00503017 push 33449BD0h; mov dword ptr [esp], edx0_2_0050305C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ecx; mov dword ptr [esp], 4C5E08F8h0_2_00407027
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ebx; mov dword ptr [esp], 24D2B124h0_2_0040705E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push esi; mov dword ptr [esp], 2B064EE4h0_2_00407069
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 0985E673h; mov dword ptr [esp], edi0_2_00407089
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 63D04460h; mov dword ptr [esp], edi0_2_00407096
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ebp; mov dword ptr [esp], esi0_2_0040709A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ebx; mov dword ptr [esp], 5DFF7C91h0_2_004070D6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push edx; mov dword ptr [esp], 71422666h0_2_004071C6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 362D96F9h; mov dword ptr [esp], ebx0_2_004071E6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ecx; mov dword ptr [esp], edx0_2_00407235
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 3F8B2A36h; mov dword ptr [esp], edx0_2_0040727F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 6DE97919h; mov dword ptr [esp], edx0_2_00407314
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 2C31BBD1h; mov dword ptr [esp], ebp0_2_00407351
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push esi; mov dword ptr [esp], 00000000h0_2_00407365
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 05259C87h; mov dword ptr [esp], edi0_2_00407441
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 3F593084h; mov dword ptr [esp], edx0_2_00407458
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push edi; mov dword ptr [esp], 7F79F215h0_2_00407461
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push esi; mov dword ptr [esp], edx0_2_00407469
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ecx; mov dword ptr [esp], ebx0_2_00407507
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ecx; mov dword ptr [esp], 6632BAF2h0_2_004075A1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push esi; mov dword ptr [esp], edx0_2_004075D7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 5E5225CBh; mov dword ptr [esp], ebx0_2_00407637
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ecx; mov dword ptr [esp], eax0_2_004076BD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push edi; mov dword ptr [esp], eax0_2_00407710
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push ecx; mov dword ptr [esp], 7FE102ABh0_2_00407767
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 2AF78227h; mov dword ptr [esp], ebx0_2_00407798
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push eax; mov dword ptr [esp], edx0_2_0040783A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push edx; mov dword ptr [esp], ebx0_2_004078E5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407010 push 7A7B8C91h; mov dword ptr [esp], edi0_2_0040794D
    Source: file.exeStatic PE information: section name: entropy: 7.982694962288492
    Source: file.exeStatic PE information: section name: bkrfjoau entropy: 7.954491518735738

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 421585 second address: 421598 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F2281115B56h 0x0000000a push edx 0x0000000b pop edx 0x0000000c jo 00007F2281115B56h 0x00000012 popad 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 421598 second address: 4215BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F228108A3F9h 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jns 00007F228108A3E6h 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 40E8A8 second address: 40E8B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4205B8 second address: 4205BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4205BE second address: 4205D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F2281115B56h 0x0000000a popad 0x0000000b jo 00007F2281115B58h 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4205D4 second address: 4205DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4205DC second address: 4205FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F2281115B68h 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4205FB second address: 420615 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F228108A3EFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4207BF second address: 4207C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4207C3 second address: 4207D0 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4207D0 second address: 4207E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F2281115B5Ch 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4207E5 second address: 4207EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 420937 second address: 42093D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424902 second address: 42493C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a nop 0x0000000b movzx edx, cx 0x0000000e push 00000000h 0x00000010 mov dword ptr [ebp+122DB9ACh], ecx 0x00000016 call 00007F228108A3E9h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e jnl 00007F228108A3E6h 0x00000024 js 00007F228108A3E6h 0x0000002a popad 0x0000002b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 42493C second address: 424957 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B60h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424957 second address: 42495B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 42495B second address: 424971 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B62h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424CA5 second address: 424CA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424CA9 second address: 424CCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+122D2BD9h] 0x0000000e push 00000000h 0x00000010 sub dx, 27B7h 0x00000015 call 00007F2281115B59h 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424CCD second address: 424CE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424CE1 second address: 424CFE instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2281115B63h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424CFE second address: 424D02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424D02 second address: 424D06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 424D06 second address: 424D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 442F21 second address: 442F29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4431CF second address: 4431D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4431D3 second address: 4431DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4431DE second address: 44320D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F228108A3EDh 0x0000000a popad 0x0000000b jo 00007F228108A42Bh 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F228108A3F4h 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4434DB second address: 4434E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4434E6 second address: 4434EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4434EC second address: 4434F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4434F0 second address: 443515 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F228108A3F1h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4437C7 second address: 4437D7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push esi 0x00000004 pop esi 0x00000005 push edi 0x00000006 pop edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007F2281115B56h 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 443963 second address: 443974 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jnl 00007F228108A3E6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 443974 second address: 44397A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 44397A second address: 443980 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 443980 second address: 443985 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 443985 second address: 44398B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 443B2E second address: 443B44 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push edi 0x00000006 pop edi 0x00000007 jo 00007F2281115B56h 0x0000000d popad 0x0000000e js 00007F2281115B5Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 44413A second address: 44413F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 444CF3 second address: 444D06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jo 00007F2281115B56h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 popad 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 444D06 second address: 444D0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 449DD6 second address: 449DDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4510F6 second address: 451114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F228108A3F7h 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4512A0 second address: 4512D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B63h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F2281115B67h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4512D3 second address: 4512D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4512D9 second address: 4512DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4512DD second address: 4512E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453C8C second address: 453CD5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B5Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 1AEA150Eh 0x00000010 push 00000000h 0x00000012 push eax 0x00000013 call 00007F2281115B58h 0x00000018 pop eax 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc eax 0x00000026 push eax 0x00000027 ret 0x00000028 pop eax 0x00000029 ret 0x0000002a mov edi, dword ptr [ebp+122D2ACDh] 0x00000030 call 00007F2281115B59h 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453CD5 second address: 453CD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453CD9 second address: 453CDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453CDF second address: 453CFC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F228108A3F2h 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453CFC second address: 453D06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F2281115B56h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453D06 second address: 453D0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453D0A second address: 453D20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e js 00007F2281115B58h 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453D20 second address: 453D48 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F228108A3E8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F228108A3F7h 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4543A0 second address: 4543C2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2281115B66h 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 454843 second address: 454848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 454D52 second address: 454D56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 454D56 second address: 454D5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 454D5C second address: 454D62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45531E second address: 4553BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jne 00007F228108A3F8h 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 call 00007F228108A3E8h 0x00000019 pop eax 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc eax 0x00000027 push eax 0x00000028 ret 0x00000029 pop eax 0x0000002a ret 0x0000002b adc esi, 1FD3D6BFh 0x00000031 push 00000000h 0x00000033 jno 00007F228108A3EBh 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007F228108A3E8h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 0000001Dh 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 xchg eax, ebx 0x00000056 jmp 00007F228108A3F7h 0x0000005b push eax 0x0000005c pushad 0x0000005d pushad 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4553BE second address: 4553CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F2281115B56h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 456DF7 second address: 456DFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 456DFB second address: 456E05 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 456E05 second address: 456E51 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F228108A3ECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov esi, eax 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007F228108A3E8h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 0000001Ah 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b or edi, 68DD838Bh 0x00000031 or dword ptr [ebp+122D243Bh], ecx 0x00000037 push 00000000h 0x00000039 push eax 0x0000003a pushad 0x0000003b pushad 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4577A9 second address: 4577AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4577AD second address: 4577B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4582AB second address: 4582B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4582B0 second address: 4582DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F228108A3ECh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007F228108A3F7h 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4582DF second address: 458337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2281115B5Fh 0x00000009 popad 0x0000000a popad 0x0000000b nop 0x0000000c pushad 0x0000000d jno 00007F2281115B5Ch 0x00000013 jg 00007F2281115B5Ch 0x00000019 popad 0x0000001a push 00000000h 0x0000001c mov esi, 6CA7C3FEh 0x00000021 jmp 00007F2281115B64h 0x00000026 push 00000000h 0x00000028 mov di, CB0Ch 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 458337 second address: 45833B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45833B second address: 458358 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B69h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 458D1C second address: 458D30 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 pop eax 0x00000013 popad 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4596B1 second address: 4596B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4596B7 second address: 4596D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4596D6 second address: 4596DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45A153 second address: 45A15D instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45A15D second address: 45A1F4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2281115B5Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007F2281115B58h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 call 00007F2281115B5Bh 0x0000002c sbb di, 893Ah 0x00000031 pop edi 0x00000032 push 00000000h 0x00000034 jc 00007F2281115B56h 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push esi 0x0000003f call 00007F2281115B58h 0x00000044 pop esi 0x00000045 mov dword ptr [esp+04h], esi 0x00000049 add dword ptr [esp+04h], 00000018h 0x00000051 inc esi 0x00000052 push esi 0x00000053 ret 0x00000054 pop esi 0x00000055 ret 0x00000056 xchg eax, ebx 0x00000057 push edx 0x00000058 jmp 00007F2281115B64h 0x0000005d pop edx 0x0000005e push eax 0x0000005f pushad 0x00000060 jl 00007F2281115B58h 0x00000066 pushad 0x00000067 popad 0x00000068 push eax 0x00000069 push edx 0x0000006a jp 00007F2281115B56h 0x00000070 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45A1F4 second address: 45A1F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45BC70 second address: 45BCE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B5Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a push eax 0x0000000b jmp 00007F2281115B69h 0x00000010 nop 0x00000011 mov di, si 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007F2281115B58h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000016h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 push edi 0x00000031 sbb ebx, 788D1A68h 0x00000037 pop edi 0x00000038 mov dword ptr [ebp+12451F7Dh], ebx 0x0000003e sub edi, 11ACEB4Ah 0x00000044 push 00000000h 0x00000046 xor bx, E100h 0x0000004b xchg eax, esi 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f jl 00007F2281115B56h 0x00000055 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45BCE2 second address: 45BCE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45BCE6 second address: 45BD05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F2281115B64h 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45BEAD second address: 45BEB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45ECD9 second address: 45ECDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45ECDD second address: 45ECE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45ECE7 second address: 45ECEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45ECEB second address: 45ECF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45FCEF second address: 45FD6B instructions: 0x00000000 rdtsc 0x00000002 je 00007F2281115B5Ch 0x00000008 jp 00007F2281115B56h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 jnc 00007F2281115B60h 0x00000017 nop 0x00000018 jmp 00007F2281115B5Bh 0x0000001d push 00000000h 0x0000001f jmp 00007F2281115B66h 0x00000024 push 00000000h 0x00000026 push 00000000h 0x00000028 push ecx 0x00000029 call 00007F2281115B58h 0x0000002e pop ecx 0x0000002f mov dword ptr [esp+04h], ecx 0x00000033 add dword ptr [esp+04h], 0000001Bh 0x0000003b inc ecx 0x0000003c push ecx 0x0000003d ret 0x0000003e pop ecx 0x0000003f ret 0x00000040 mov edi, eax 0x00000042 push eax 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F2281115B5Dh 0x0000004a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45EE55 second address: 45EE5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45FD6B second address: 45FD87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2281115B67h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45EE5E second address: 45EE62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45FF40 second address: 45FF46 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 460F54 second address: 460F5E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F228108A3ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45FF46 second address: 45FF54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 460011 second address: 460015 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46208B second address: 46208F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 460015 second address: 460019 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 463D41 second address: 463DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push ebx 0x00000007 jns 00007F2281115B5Ch 0x0000000d pop ebx 0x0000000e nop 0x0000000f mov edi, 10649F4Dh 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push edi 0x00000019 call 00007F2281115B58h 0x0000001e pop edi 0x0000001f mov dword ptr [esp+04h], edi 0x00000023 add dword ptr [esp+04h], 00000019h 0x0000002b inc edi 0x0000002c push edi 0x0000002d ret 0x0000002e pop edi 0x0000002f ret 0x00000030 mov dword ptr [ebp+12451F0Bh], esi 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ecx 0x0000003b call 00007F2281115B58h 0x00000040 pop ecx 0x00000041 mov dword ptr [esp+04h], ecx 0x00000045 add dword ptr [esp+04h], 00000018h 0x0000004d inc ecx 0x0000004e push ecx 0x0000004f ret 0x00000050 pop ecx 0x00000051 ret 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 463DAC second address: 463DB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 463DB2 second address: 463DB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 465D51 second address: 465D56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4662C4 second address: 4662C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4662C8 second address: 466312 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F228108A3F4h 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F228108A3F8h 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 466312 second address: 46632B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2281115B64h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46632B second address: 46638F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov ebx, dword ptr [ebp+122D3033h] 0x0000000e push 00000000h 0x00000010 add bx, C798h 0x00000015 mov edi, dword ptr [ebp+122D298Dh] 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push edi 0x00000020 call 00007F228108A3E8h 0x00000025 pop edi 0x00000026 mov dword ptr [esp+04h], edi 0x0000002a add dword ptr [esp+04h], 0000001Ah 0x00000032 inc edi 0x00000033 push edi 0x00000034 ret 0x00000035 pop edi 0x00000036 ret 0x00000037 mov di, bx 0x0000003a xchg eax, esi 0x0000003b jmp 00007F228108A3F6h 0x00000040 push eax 0x00000041 push eax 0x00000042 push edx 0x00000043 jp 00007F228108A3E8h 0x00000049 push edx 0x0000004a pop edx 0x0000004b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46638F second address: 466394 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46849B second address: 4684A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4684A1 second address: 4684B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 jne 00007F2281115B56h 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 413888 second address: 41389E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F228108A3F2h 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 41389E second address: 4138BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B68h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 468B8C second address: 468B96 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 469A76 second address: 469AF8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F2281115B5Dh 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 movzx ebx, si 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push ebp 0x0000001b call 00007F2281115B58h 0x00000020 pop ebp 0x00000021 mov dword ptr [esp+04h], ebp 0x00000025 add dword ptr [esp+04h], 00000018h 0x0000002d inc ebp 0x0000002e push ebp 0x0000002f ret 0x00000030 pop ebp 0x00000031 ret 0x00000032 cld 0x00000033 call 00007F2281115B60h 0x00000038 pushad 0x00000039 mov ch, D0h 0x0000003b mov di, 6FF2h 0x0000003f popad 0x00000040 pop ebx 0x00000041 push 00000000h 0x00000043 push 00000000h 0x00000045 push ebp 0x00000046 call 00007F2281115B58h 0x0000004b pop ebp 0x0000004c mov dword ptr [esp+04h], ebp 0x00000050 add dword ptr [esp+04h], 00000014h 0x00000058 inc ebp 0x00000059 push ebp 0x0000005a ret 0x0000005b pop ebp 0x0000005c ret 0x0000005d push eax 0x0000005e push ebx 0x0000005f push eax 0x00000060 push edx 0x00000061 jnc 00007F2281115B56h 0x00000067 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46650E second address: 46658C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007F228108A3F0h 0x0000000f mov di, E392h 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007F228108A3E8h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000014h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 jmp 00007F228108A3EBh 0x00000039 mov dword ptr fs:[00000000h], esp 0x00000040 mov di, cx 0x00000043 mov eax, dword ptr [ebp+122D0819h] 0x00000049 mov dword ptr [ebp+122DB9ACh], edx 0x0000004f push FFFFFFFFh 0x00000051 mov bx, C1A9h 0x00000055 push eax 0x00000056 pushad 0x00000057 jp 00007F228108A3ECh 0x0000005d jng 00007F228108A3ECh 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 463FC9 second address: 463FCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46ACC9 second address: 46ACCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46ACCD second address: 46ACD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46ACD3 second address: 46ACDA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46CB7B second address: 46CB95 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F2281115B5Ch 0x00000008 ja 00007F2281115B56h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jne 00007F2281115B56h 0x0000001a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46DB8C second address: 46DB92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46CD6C second address: 46CD76 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F2281115B5Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46CD76 second address: 46CE06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebp 0x0000000a call 00007F228108A3E8h 0x0000000f pop ebp 0x00000010 mov dword ptr [esp+04h], ebp 0x00000014 add dword ptr [esp+04h], 00000017h 0x0000001c inc ebp 0x0000001d push ebp 0x0000001e ret 0x0000001f pop ebp 0x00000020 ret 0x00000021 push dword ptr fs:[00000000h] 0x00000028 mov edi, 44B04D40h 0x0000002d mov dword ptr fs:[00000000h], esp 0x00000034 jg 00007F228108A3E8h 0x0000003a add dword ptr [ebp+122D248Fh], esi 0x00000040 mov eax, dword ptr [ebp+122D0F35h] 0x00000046 mov edi, dword ptr [ebp+122D2499h] 0x0000004c mov ebx, ecx 0x0000004e push FFFFFFFFh 0x00000050 push 00000000h 0x00000052 push esi 0x00000053 call 00007F228108A3E8h 0x00000058 pop esi 0x00000059 mov dword ptr [esp+04h], esi 0x0000005d add dword ptr [esp+04h], 00000014h 0x00000065 inc esi 0x00000066 push esi 0x00000067 ret 0x00000068 pop esi 0x00000069 ret 0x0000006a jmp 00007F228108A3F3h 0x0000006f nop 0x00000070 jc 00007F228108A3EEh 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 46CE06 second address: 46CE11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 470FE1 second address: 470FEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 470FEA second address: 470FF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 476AA3 second address: 476ADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F228108A3EAh 0x0000000a jg 00007F228108A409h 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 476ADF second address: 476AE5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 476AE5 second address: 476AFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F228108A3EFh 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 476AFF second address: 476B29 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F2281115B74h 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479BA2 second address: 479BA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479BA9 second address: 479BBF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007F2281115B56h 0x0000000b js 00007F2281115B56h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479BBF second address: 479BC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479D35 second address: 479D43 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479D43 second address: 479D4B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479EE3 second address: 479F06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2281115B61h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007F2281115B56h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479F06 second address: 479F0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479F0A second address: 479F10 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 479F10 second address: 479F1C instructions: 0x00000000 rdtsc 0x00000002 jo 00007F228108A3EEh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47A06C second address: 47A073 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47E75F second address: 47E764 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47E764 second address: 47E76A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47E76A second address: 47E777 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47E777 second address: 47E796 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2281115B5Fh 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47E796 second address: 47E7C8 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b jo 00007F228108A3E6h 0x00000011 pop esi 0x00000012 popad 0x00000013 mov eax, dword ptr [eax] 0x00000015 jmp 00007F228108A3ECh 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e pushad 0x0000001f jo 00007F228108A3E8h 0x00000025 push eax 0x00000026 pop eax 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 47E7C8 second address: 47E7CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4835A0 second address: 4835D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F228108A3EBh 0x0000000a jmp 00007F228108A3F2h 0x0000000f jmp 00007F228108A3F2h 0x00000014 popad 0x00000015 pushad 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 483C93 second address: 483CA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007F2281115B5Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 483CA3 second address: 483CB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 je 00007F228108A3E8h 0x0000000e pushad 0x0000000f push eax 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4840F4 second address: 4840FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4846ED second address: 4846F9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F228108A3E6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4846F9 second address: 4846FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 489C12 second address: 489C1C instructions: 0x00000000 rdtsc 0x00000002 jns 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A133 second address: 48A156 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2281115B68h 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A156 second address: 48A179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F228108A3F2h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e jnp 00007F228108A3ECh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A179 second address: 48A1B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2281115B67h 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007F2281115B56h 0x00000011 jmp 00007F2281115B65h 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A1B1 second address: 48A1CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A1CC second address: 48A1D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A2E6 second address: 48A317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F228108A3F5h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pushad 0x0000000c pushad 0x0000000d jmp 00007F228108A3F2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48996F second address: 489973 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A64F second address: 48A661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pushad 0x0000000a popad 0x0000000b jg 00007F228108A3E6h 0x00000011 pop eax 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A79F second address: 48A7AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F2281115B56h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 48A7AB second address: 48A7B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 494734 second address: 494739 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 494739 second address: 494757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F228108A3E6h 0x0000000a jmp 00007F228108A3EFh 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 494757 second address: 494761 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2281115B56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4930BC second address: 4930C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4930C0 second address: 4930D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B5Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4930D8 second address: 4930DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4930DC second address: 4930EE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F2281115B5Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493387 second address: 49338E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4934F3 second address: 49352B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F2281115B56h 0x0000000a pop esi 0x0000000b jmp 00007F2281115B68h 0x00000010 pushad 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F2281115B5Dh 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49352B second address: 493534 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493534 second address: 49353A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4937FB second address: 49380E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 js 00007F228108A3E6h 0x0000000b push edx 0x0000000c pop edx 0x0000000d popad 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493B0E second address: 493B35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F2281115B56h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F2281115B68h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493B35 second address: 493B39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493B39 second address: 493B3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493CA7 second address: 493CCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F228108A3E6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F228108A3F0h 0x00000012 jbe 00007F228108A3E6h 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493CCA second address: 493CEC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F2281115B61h 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 pushad 0x00000012 popad 0x00000013 push edi 0x00000014 pop edi 0x00000015 popad 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 493CEC second address: 493D06 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007F228108A3EEh 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 438AB7 second address: 438ABD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 438ABD second address: 438AC6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 438AC6 second address: 438AD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F2281115B56h 0x0000000a popad 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 438AD1 second address: 438AD6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 438AD6 second address: 438AE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007F2281115B56h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 438AE9 second address: 438AEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 492DED second address: 492E03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push edx 0x00000008 jmp 00007F2281115B5Dh 0x0000000d pop edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45269A second address: 4526A3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4526A3 second address: 4526A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 452D15 second address: 452D20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 452D20 second address: 452D2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F2281115B56h 0x0000000a popad 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453013 second address: 4530AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007F228108A3E8h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 0000001Ah 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 jmp 00007F228108A3F3h 0x00000025 jmp 00007F228108A3F4h 0x0000002a push 00000004h 0x0000002c push 00000000h 0x0000002e push esi 0x0000002f call 00007F228108A3E8h 0x00000034 pop esi 0x00000035 mov dword ptr [esp+04h], esi 0x00000039 add dword ptr [esp+04h], 00000019h 0x00000041 inc esi 0x00000042 push esi 0x00000043 ret 0x00000044 pop esi 0x00000045 ret 0x00000046 nop 0x00000047 push edx 0x00000048 jmp 00007F228108A3EFh 0x0000004d pop edx 0x0000004e push eax 0x0000004f pushad 0x00000050 pushad 0x00000051 jmp 00007F228108A3F0h 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453601 second address: 45361B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2281115B65h 0x00000009 popad 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45361B second address: 453633 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F228108A3E6h 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4538D9 second address: 4538F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 jc 00007F2281115B56h 0x00000016 popad 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4538F0 second address: 45395C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnl 00007F228108A3E6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007F228108A3E8h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 jmp 00007F228108A3EEh 0x0000002e xor di, BF7Fh 0x00000033 movsx ecx, dx 0x00000036 lea eax, dword ptr [ebp+12482211h] 0x0000003c jmp 00007F228108A3F3h 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 je 00007F228108A3E6h 0x0000004c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45395C second address: 453962 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453962 second address: 438AB7 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F228108A3E8h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f add cx, 9C14h 0x00000014 call dword ptr [ebp+122D2893h] 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4986E9 second address: 4986F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F2281115B56h 0x0000000a popad 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4986F4 second address: 498710 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F6h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 498857 second address: 498864 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F2281115B58h 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 498864 second address: 49886A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4989A7 second address: 4989B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 498E2B second address: 498E36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 498E36 second address: 498E47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jl 00007F2281115B68h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 498E47 second address: 498E4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49C823 second address: 49C829 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49C829 second address: 49C83F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F228108A3F2h 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49EC6E second address: 49EC72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49EC72 second address: 49EC76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 40CEF3 second address: 40CEF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49E7F7 second address: 49E80E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F228108A3EDh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49E80E second address: 49E812 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49E812 second address: 49E82B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49E82B second address: 49E83F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 je 00007F2281115B56h 0x0000000e je 00007F2281115B56h 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49E83F second address: 49E843 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49E843 second address: 49E859 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007F2281115B56h 0x00000010 jnp 00007F2281115B56h 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1461 second address: 4A146A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ecx 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A1776 second address: 4A1780 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push esi 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A18D5 second address: 4A18EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F228108A3F3h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A18EE second address: 4A18FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A33EF second address: 4A3412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnl 00007F228108A3E8h 0x0000000f push eax 0x00000010 push edx 0x00000011 push ebx 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A3412 second address: 4A3417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A3417 second address: 4A341D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A341D second address: 4A3421 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A3421 second address: 4A343B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F6h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A7214 second address: 4A7227 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop ebx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007F2281115B56h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A7227 second address: 4A7234 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F228108A3E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A73BA second address: 4A73BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A73BE second address: 4A73D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edi 0x0000000a pop edi 0x0000000b jmp 00007F228108A3EAh 0x00000010 popad 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A77EE second address: 4A77F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A7939 second address: 4A7948 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jnp 00007F228108A3E6h 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4A7948 second address: 4A7955 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD630 second address: 4AD648 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F228108A3F4h 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD648 second address: 4AD64E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD7A5 second address: 4AD7AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD7AB second address: 4AD7AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD7AF second address: 4AD7B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD7B5 second address: 4AD7C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jbe 00007F2281115B56h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4AD7C7 second address: 4AD7E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 453321 second address: 45333C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F2281115B56h 0x0000000a popad 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F2281115B5Ch 0x00000014 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 45333C second address: 453343 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4ADE19 second address: 4ADE1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B1905 second address: 4B192B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007F228108A3E8h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F228108A3F4h 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B192B second address: 4B192F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B192F second address: 4B1935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B1935 second address: 4B1944 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F2281115B5Ah 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B1944 second address: 4B194C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B9647 second address: 4B9650 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B9650 second address: 4B9656 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B7E1F second address: 4B7E31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007F2281115B56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B7E31 second address: 4B7E3B instructions: 0x00000000 rdtsc 0x00000002 jo 00007F228108A3E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B7E3B second address: 4B7E41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B8151 second address: 4B8157 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B8157 second address: 4B8165 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2281115B5Ah 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B8165 second address: 4B816F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B816F second address: 4B8175 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B8CF4 second address: 4B8CF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B8FDD second address: 4B8FF4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B5Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B8FF4 second address: 4B902F instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F228108A3E6h 0x00000008 jmp 00007F228108A3F3h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pop edi 0x00000016 jmp 00007F228108A3F7h 0x0000001b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B902F second address: 4B9047 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2281115B56h 0x00000008 js 00007F2281115B56h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007F2281115B56h 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B9047 second address: 4B904B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B92D9 second address: 4B9315 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jo 00007F2281115B56h 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f jg 00007F2281115B56h 0x00000015 popad 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push ebx 0x0000001a jmp 00007F2281115B69h 0x0000001f pop ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 jnp 00007F2281115B56h 0x00000028 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4B9315 second address: 4B932C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F228108A3E6h 0x00000008 jmp 00007F228108A3EDh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BD571 second address: 4BD577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BD577 second address: 4BD590 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F228108A3ECh 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BD590 second address: 4BD5B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 js 00007F2281115B79h 0x0000000c jmp 00007F2281115B63h 0x00000011 pushad 0x00000012 js 00007F2281115B56h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BD830 second address: 4BD834 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BD9C6 second address: 4BD9D5 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BD9D5 second address: 4BD9DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BDEFE second address: 4BDF02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BDF02 second address: 4BDF08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BDF08 second address: 4BDF0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BDF0D second address: 4BDF1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4BDF1A second address: 4BDF1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C997A second address: 4C997E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C997E second address: 4C99A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F2281115B60h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F2281115B64h 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C99A8 second address: 4C99B4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F228108A3EEh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C99B4 second address: 4C99C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F2281115B56h 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C99C3 second address: 4C99C9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C9FFD second address: 4CA007 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2281115B56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA40E second address: 4CA412 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA412 second address: 4CA418 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA418 second address: 4CA41E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA41E second address: 4CA439 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F2281115B5Dh 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA58D second address: 4CA591 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CAF59 second address: 4CAF5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CAF5E second address: 4CAF82 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F228108A3FBh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CAF82 second address: 4CAF87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CB6F5 second address: 4CB6FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C94EA second address: 4C94FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F2281115B5Bh 0x0000000d rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C94FD second address: 4C951A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F228108A3F8h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D365A second address: 4D365E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D37AE second address: 4D37B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edi 0x00000007 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D38DF second address: 4D38E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D38E3 second address: 4D38E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D38E7 second address: 4D38F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jo 00007F2281115B56h 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D38F9 second address: 4D3933 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 jo 00007F228108A3E6h 0x00000017 push eax 0x00000018 pop eax 0x00000019 popad 0x0000001a pushad 0x0000001b jng 00007F228108A3E6h 0x00000021 push eax 0x00000022 pop eax 0x00000023 push ebx 0x00000024 pop ebx 0x00000025 popad 0x00000026 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D53FC second address: 4D541A instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2281115B56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edx 0x0000000c pop edx 0x0000000d jmp 00007F2281115B5Eh 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E1040 second address: 4E1062 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F228108A3E8h 0x0000000c popad 0x0000000d push ebx 0x0000000e jne 00007F228108A3EEh 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 pop esi 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E119E second address: 4E11A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E11A7 second address: 4E11C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F228108A3F5h 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E2BCB second address: 4E2BCF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E2BCF second address: 4E2BDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E2BDB second address: 4E2BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E2BDF second address: 4E2BFB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F228108A3ECh 0x00000007 je 00007F228108A3E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E2BFB second address: 4E2BFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E42AD second address: 4E42D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F228108A3F9h 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E42D3 second address: 4E42EE instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2281115B58h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2281115B5Dh 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E6243 second address: 4E6249 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E6249 second address: 4E626C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2281115B69h 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E626C second address: 4E6270 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5E24 second address: 4E5E2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5E2C second address: 4E5E36 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F228108A3EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5F7F second address: 4E5F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F2281115B56h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5F89 second address: 4E5F93 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F228108A3E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5F93 second address: 4E5FAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ecx 0x0000000a pushad 0x0000000b push esi 0x0000000c jp 00007F2281115B56h 0x00000012 pushad 0x00000013 popad 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5FAC second address: 4E5FB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4E5FB0 second address: 4E5FB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F573F second address: 4F5743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F76D3 second address: 4F76D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F76D9 second address: 4F76DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F76DF second address: 4F76E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F76E5 second address: 4F76E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F76E9 second address: 4F76ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F76ED second address: 4F7705 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b jng 00007F228108A3E6h 0x00000011 jns 00007F228108A3E6h 0x00000017 pop eax 0x00000018 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4F7705 second address: 4F771B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2281115B5Bh 0x00000008 jl 00007F2281115B56h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4FCD6D second address: 4FCD73 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 502146 second address: 50214E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 50214E second address: 502154 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 502154 second address: 50215A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 50215A second address: 502160 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5026CB second address: 5026D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 50282D second address: 50283F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F228108A3ECh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 50283F second address: 502845 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 502845 second address: 502849 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 502849 second address: 50284D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 50284D second address: 502888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F228108A3E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jne 00007F228108A403h 0x00000012 je 00007F228108A3E6h 0x00000018 jmp 00007F228108A3F7h 0x0000001d pop edx 0x0000001e pop eax 0x0000001f pushad 0x00000020 push ecx 0x00000021 push edx 0x00000022 pop edx 0x00000023 pushad 0x00000024 popad 0x00000025 pop ecx 0x00000026 pushad 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 502A04 second address: 502A0E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F2281115B56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5066C0 second address: 5066C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5066C5 second address: 5066CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5063C8 second address: 5063CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4152D0 second address: 4152D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 51BA67 second address: 51BA77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jnl 00007F228108A3E6h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 51BA77 second address: 51BA7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 51BA7D second address: 51BA82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 51BA82 second address: 51BA87 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 51BA87 second address: 51BA8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 515120 second address: 515125 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5287E5 second address: 5287EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F228108A3E6h 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5287EF second address: 528812 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2281115B66h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 528812 second address: 528818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 543CD3 second address: 543CDD instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2281115B56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 542E1A second address: 542E24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 542E24 second address: 542E35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F2281115B56h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5433F3 second address: 543411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F228108A3F5h 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 545489 second address: 54548D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 54548D second address: 5454E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F228108A3F8h 0x0000000b jmp 00007F228108A3EFh 0x00000010 jnp 00007F228108A3FFh 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a jbe 00007F228108A3E6h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5454E5 second address: 5454F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jnl 00007F2281115B56h 0x00000010 push eax 0x00000011 pop eax 0x00000012 popad 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 549521 second address: 549525 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 54AFD0 second address: 54AFD5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D70DA6 second address: 4D70E56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov bl, 20h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ecx, dword ptr [eax+00000FDCh] 0x00000010 pushad 0x00000011 mov ch, C4h 0x00000013 mov cl, bl 0x00000015 popad 0x00000016 test ecx, ecx 0x00000018 pushad 0x00000019 call 00007F228108A3F4h 0x0000001e pop ebx 0x0000001f mov cx, 2CDDh 0x00000023 popad 0x00000024 jns 00007F228108A46Bh 0x0000002a pushad 0x0000002b mov ebx, eax 0x0000002d pushfd 0x0000002e jmp 00007F228108A3F2h 0x00000033 adc esi, 63980668h 0x00000039 jmp 00007F228108A3EBh 0x0000003e popfd 0x0000003f popad 0x00000040 add eax, ecx 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 pushfd 0x00000046 jmp 00007F228108A3EBh 0x0000004b jmp 00007F228108A3F3h 0x00000050 popfd 0x00000051 pushfd 0x00000052 jmp 00007F228108A3F8h 0x00000057 and cl, 00000028h 0x0000005a jmp 00007F228108A3EBh 0x0000005f popfd 0x00000060 popad 0x00000061 rdtsc
    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D70E56 second address: 4D70E5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 448914 instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 2A3AD6 instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 45270A instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 4D6C85 instructions caused by: Self-modifying code
    Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
    Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 2000Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 2828Thread sleep time: -30000s >= -30000sJump to behavior
    Source: file.exe, file.exe, 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
    Source: file.exe, 00000000.00000002.2073082596.0000000000FB4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073082596.0000000000FCA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071812749.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071927479.0000000000FCA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071927479.0000000000FB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: file.exe, 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
    Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
    Source: C:\Users\user\Desktop\file.exeFile opened: SICE
    Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00285BB0 LdrInitializeThunk,0_2_00285BB0

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: file.exeString found in binary or memory: clearancek.site
    Source: file.exeString found in binary or memory: licendfilteo.site
    Source: file.exeString found in binary or memory: spirittunek.stor
    Source: file.exeString found in binary or memory: bathdoomgaz.stor
    Source: file.exeString found in binary or memory: studennotediw.stor
    Source: file.exeString found in binary or memory: dissapoiznw.stor
    Source: file.exeString found in binary or memory: eaglepawnoy.stor
    Source: file.exeString found in binary or memory: mobbipenju.stor
    Source: file.exe, file.exe, 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: fProgram Manager
    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Process Injection
    24
    Virtualization/Sandbox Evasion
    OS Credential Dumping631
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    PowerShell
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory24
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
    Obfuscated Files or Information
    NTDS23
    System Information Discovery
    Distributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Software Packing
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe49%VirustotalBrowse
    file.exe100%AviraTR/Crypt.ZPACK.Gen
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    steamcommunity.com0%VirustotalBrowse
    spirittunek.store14%VirustotalBrowse
    licendfilteo.site16%VirustotalBrowse
    dissapoiznw.store14%VirustotalBrowse
    eaglepawnoy.store18%VirustotalBrowse
    studennotediw.store18%VirustotalBrowse
    mobbipenju.store14%VirustotalBrowse
    bathdoomgaz.store14%VirustotalBrowse
    clearancek.site18%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://player.vimeo.com0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=english0%URL Reputationsafe
    https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f0%URL Reputationsafe
    https://help.steampowered.com/en/0%URL Reputationsafe
    https://store.steampowered.com/news/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/0%URL Reputationsafe
    https://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    https://www.gstatic.cn/recaptcha/0%URL Reputationsafe
    http://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
    https://recaptcha.net/recaptcha/;0%URL Reputationsafe
    http://www.valvesoftware.com/legal.htm0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png0%URL Reputationsafe
    https://store.steampowered.com/stats/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png0%URL Reputationsafe
    https://medal.tv0%URL Reputationsafe
    https://broadcast.st.dl.eccdnx.com0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=10%URL Reputationsafe
    https://store.steampowered.com/steam_refunds/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&amp;0%URL Reputationsafe
    https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL0%URL Reputationsafe
    https://login.steampowered.com/0%URL Reputationsafe
    https://store.steampowered.com/legal/0%URL Reputationsafe
    https://steam.tv/0%URL Reputationsafe
    https://steamcommunity.com/profiles/76561199724331900100%URL Reputationmalware
    https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&amp;l=english0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=engl0%URL Reputationsafe
    http://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    https://store.steampowered.com/points/shop/0%URL Reputationsafe
    https://recaptcha.net0%URL Reputationsafe
    https://store.steampowered.com/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw0%URL Reputationsafe
    https://lv.queniujq.cn0%URL Reputationsafe
    https://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=en0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=9620160%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=english0%URL Reputationsafe
    https://checkout.steampowered.com/0%URL Reputationsafe
    https://help.steampowered.com/0%URL Reputationsafe
    https://api.steampowered.com/0%URL Reputationsafe
    http://store.steampowered.com/account/cookiepreferences/0%URL Reputationsafe
    https://store.steampowered.com/mobile0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png0%URL Reputationsafe
    https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC0%URL Reputationsafe
    https://store.steampowered.com/;0%URL Reputationsafe
    https://store.steampowered.com/about/0%URL Reputationsafe
    https://steamcommunity.com/?subsection=broadcasts0%VirustotalBrowse
    https://steamcommunity.com/my/wishlist/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm0%VirustotalBrowse
    https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp0%VirustotalBrowse
    https://steamcommunity.com/10%VirustotalBrowse
    https://steamcommunity.com/market/0%VirustotalBrowse
    https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org0%VirustotalBrowse
    https://www.youtube.com0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&amp;l=engli0%VirustotalBrowse
    https://www.google.com0%VirustotalBrowse
    https://steamcommunity.com/workshop/0%VirustotalBrowse
    https://steamcommunity.com/discussions/0%VirustotalBrowse
    clearancek.site18%VirustotalBrowse
    https://steamcommunity.com/login/home/?goto=profiles%2F765611997243319000%VirustotalBrowse
    licendfilteo.site16%VirustotalBrowse
    https://steamcommunity.com/q0%VirustotalBrowse
    http://127.0.0.1:270600%VirustotalBrowse
    https://steamcommunity.com0%VirustotalBrowse
    https://sketchfab.com0%VirustotalBrowse
    https://www.youtube.com/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a0%VirustotalBrowse
    https://www.google.com/recaptcha/0%VirustotalBrowse
    https://steamcommunity.com/0%VirustotalBrowse
    https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    steamcommunity.com
    104.102.49.254
    truefalseunknown
    eaglepawnoy.store
    unknown
    unknownfalseunknown
    bathdoomgaz.store
    unknown
    unknownfalseunknown
    spirittunek.store
    unknown
    unknownfalseunknown
    licendfilteo.site
    unknown
    unknowntrueunknown
    studennotediw.store
    unknown
    unknownfalseunknown
    mobbipenju.store
    unknown
    unknownfalseunknown
    clearancek.site
    unknown
    unknowntrueunknown
    dissapoiznw.store
    unknown
    unknownfalseunknown
    NameMaliciousAntivirus DetectionReputation
    studennotediw.stortrue
      unknown
      spirittunek.stortrue
        unknown
        eaglepawnoy.stortrue
          unknown
          clearancek.sitetrueunknown
          mobbipenju.stortrue
            unknown
            https://steamcommunity.com/profiles/76561199724331900true
            • URL Reputation: malware
            unknown
            licendfilteo.sitetrueunknown
            bathdoomgaz.stortrue
              unknown
              dissapoiznw.stortrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://steamcommunity.com/my/wishlist/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://player.vimeo.comfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfmfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F96000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=englishfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&ampfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://steamcommunity.com/1file.exe, 00000000.00000002.2073082596.0000000000FB4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071812749.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071927479.0000000000FB3000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5ffile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://steamcommunity.com/?subsection=broadcastsfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://help.steampowered.com/en/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://steamcommunity.com/market/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://store.steampowered.com/news/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://store.steampowered.com/subscriber_agreement/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.gstatic.cn/recaptcha/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://store.steampowered.com/subscriber_agreement/file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgfile.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F96000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://recaptcha.net/recaptcha/;file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.valvesoftware.com/legal.htmfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://steamcommunity.com/discussions/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://www.youtube.comfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.google.comfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&amp;l=englifile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://store.steampowered.com/stats/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://medal.tvfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://broadcast.st.dl.eccdnx.comfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://store.steampowered.com/steam_refunds/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&amp;file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedbackfile.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tLfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://s.ytimg.com;file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://steamcommunity.com/workshop/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://login.steampowered.com/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://store.steampowered.com/legal/file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://steam.tv/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&amp;l=englishfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=englfile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://steamcommunity.com/qfile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://store.steampowered.com/privacy_agreement/file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://store.steampowered.com/points/shop/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://recaptcha.netfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://store.steampowered.com/file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvwfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://steamcommunity.comfile.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://sketchfab.comfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://lv.queniujq.cnfile.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.youtube.com/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://127.0.0.1:27060file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&afile.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://store.steampowered.com/privacy_agreement/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=enfile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2Rfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2072861905.0000000000F96000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&amfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=englishfile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.google.com/recaptcha/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://checkout.steampowered.com/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=englishfile.exe, 00000000.00000003.2072001569.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://help.steampowered.com/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.steampowered.com/file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://store.steampowered.com/account/cookiepreferences/file.exe, 00000000.00000003.2071812749.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/mobilefile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.pngfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://steamcommunity.com/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhCfile.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2071747079.0000000001014000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/;file.exe, 00000000.00000002.2073133192.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/about/file.exe, 00000000.00000003.2071747079.0000000001019000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.102.49.254
                    steamcommunity.comUnited States
                    16625AKAMAI-ASUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1528603
                    Start date and time:2024-10-08 04:11:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 45s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:2
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@1/0@9/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): dllhost.exe
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    22:12:01API Interceptor3x Sleep call for process: file.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.102.49.254http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                    • www.valvesoftware.com/legal.htm
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    steamcommunity.comSecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    T2bmenoX1o.exeGet hashmaliciousLummaC, VidarBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    SecuriteInfo.com.Trojan.DownLoader47.43340.9153.30810.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    SecuriteInfo.com.Win32.Evo-gen.11282.4102.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    9Y6R8fs0wd.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    PFW1cgN8EK.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AKAMAI-ASUSSecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    T2bmenoX1o.exeGet hashmaliciousLummaC, VidarBrowse
                    • 104.102.49.254
                    copyright_infringement_evidence_1.exeGet hashmaliciousUnknownBrowse
                    • 23.47.168.24
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    Copyright_Infringement_Evidence.exeGet hashmaliciousUnknownBrowse
                    • 96.17.64.189
                    SecuriteInfo.com.Trojan.DownLoader47.43340.9153.30810.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    SecuriteInfo.com.Win32.Evo-gen.11282.4102.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    9Y6R8fs0wd.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    ctMI3TYXpX.exeGet hashmaliciousSmokeLoaderBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    T2bmenoX1o.exeGet hashmaliciousLummaC, VidarBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    SecuriteInfo.com.Trojan.DownLoader47.43340.9153.30810.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    SecuriteInfo.com.Win32.Evo-gen.11282.4102.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    bCnarg2O62.exeGet hashmaliciousSmokeLoaderBrowse
                    • 104.102.49.254
                    9Y6R8fs0wd.exeGet hashmaliciousLummaCBrowse
                    • 104.102.49.254
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.947564659776439
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:1'900'032 bytes
                    MD5:6e6fb447eceaa1eb52c8777a6f9aa897
                    SHA1:3b373650d36a7de08168cdf7eff08e67b3b677c3
                    SHA256:474f1a30307ad485850abf5f66db96c90f84d3f745c3b70130ec509be36af4be
                    SHA512:4b209b875d9edf7e88964122395758550fddb14912a177bcb9698a1fcee841017fae9aa7613d2419690bb8840f896f085f7925f9bab4322ebff9f006bd1dbac7
                    SSDEEP:24576:tbChgdY+q2ebQFB2Nh9JDW1aYY4VQbUM4QFevnI3hjkEP99GLBL2rtfpRmiqGqCc:pGglqoB2N9WMB4VQUuAI2EP991ReI7i
                    TLSH:069533056DA5E1CBE6C0583A4821B2C7B7BFDB36C9B605E0321165FA701C3FE675A613
                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...J..f..............................K...........@.......................... L...........@.................................W...k..
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x8bf000
                    Entrypoint Section:.taggant
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66FFF14A [Fri Oct 4 13:44:42 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:2eabe9054cad5152567f0699947a2c5b
                    Instruction
                    jmp 00007F22809A2DBAh
                    paddusb mm3, qword ptr [eax+eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    jmp 00007F22809A4DB5h
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x5f0570x6b.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f1f80x8.idata
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x5d0000x25e00645182e178095863ac6046094c0823f4False0.9995939047029703data7.982694962288492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc 0x5e0000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata 0x5f0000x10000x200fe72def8b74193a84232a780098a7ce0False0.150390625data1.04205214219471IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x600000x2b70000x20015e1bbceb6448eb1da78d68baf95aae3unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    bkrfjoau0x3170000x1a70000x1a6400312752e69bdbcc8be77ada5d702a336cFalse0.9945621253330373data7.954491518735738IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    rmllwxbw0x4be0000x10000x600e481d5101113757f4ad6745f11ed60cbFalse0.5865885416666666data5.091030307486954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .taggant0x4bf0000x30000x22004c287b8b3603767f015e583e754ba1c3False0.00666360294117647DOS executable (COM)0.019571456231530684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    DLLImport
                    kernel32.dlllstrcpy
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-10-08T04:12:01.925315+02002056471ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clearancek .site)1192.168.2.5574871.1.1.153UDP
                    2024-10-08T04:12:01.938034+02002056485ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mobbipenju .store)1192.168.2.5522291.1.1.153UDP
                    2024-10-08T04:12:01.947697+02002056483ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (eaglepawnoy .store)1192.168.2.5634721.1.1.153UDP
                    2024-10-08T04:12:01.961797+02002056481ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dissapoiznw .store)1192.168.2.5612701.1.1.153UDP
                    2024-10-08T04:12:02.012629+02002056479ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (studennotediw .store)1192.168.2.5551541.1.1.153UDP
                    2024-10-08T04:12:02.148343+02002056477ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bathdoomgaz .store)1192.168.2.5646331.1.1.153UDP
                    2024-10-08T04:12:02.309637+02002056475ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spirittunek .store)1192.168.2.5623391.1.1.153UDP
                    2024-10-08T04:12:02.320127+02002056473ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (licendfilteo .site)1192.168.2.5532371.1.1.153UDP
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 8, 2024 04:12:02.440979004 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:02.441019058 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:02.441128969 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:02.442858934 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:02.442874908 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.094345093 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.094435930 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.098851919 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.098860979 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.099232912 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.144979954 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.157959938 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.199403048 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.558573961 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.558605909 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.558646917 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.558661938 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.558682919 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.558892012 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.558892012 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.558917046 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.559148073 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.646390915 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.646456957 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.646614075 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.646614075 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.646749020 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.648488998 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.648511887 CEST44349704104.102.49.254192.168.2.5
                    Oct 8, 2024 04:12:03.648525000 CEST49704443192.168.2.5104.102.49.254
                    Oct 8, 2024 04:12:03.648530006 CEST44349704104.102.49.254192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 8, 2024 04:12:01.925314903 CEST5748753192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:01.933909893 CEST53574871.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:01.938034058 CEST5222953192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:01.946373940 CEST53522291.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:01.947696924 CEST6347253192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:01.956362963 CEST53634721.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:01.961796999 CEST6127053192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:01.971537113 CEST53612701.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:02.012629032 CEST5515453192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:02.021172047 CEST53551541.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:02.148343086 CEST6463353192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:02.157159090 CEST53646331.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:02.309637070 CEST6233953192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:02.318748951 CEST53623391.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:02.320127010 CEST5323753192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:02.332026005 CEST53532371.1.1.1192.168.2.5
                    Oct 8, 2024 04:12:02.400800943 CEST5957353192.168.2.51.1.1.1
                    Oct 8, 2024 04:12:02.407969952 CEST53595731.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 8, 2024 04:12:01.925314903 CEST192.168.2.51.1.1.10x8f8aStandard query (0)clearancek.siteA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:01.938034058 CEST192.168.2.51.1.1.10xba29Standard query (0)mobbipenju.storeA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:01.947696924 CEST192.168.2.51.1.1.10x208aStandard query (0)eaglepawnoy.storeA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:01.961796999 CEST192.168.2.51.1.1.10x99e4Standard query (0)dissapoiznw.storeA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.012629032 CEST192.168.2.51.1.1.10x5d90Standard query (0)studennotediw.storeA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.148343086 CEST192.168.2.51.1.1.10x33fcStandard query (0)bathdoomgaz.storeA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.309637070 CEST192.168.2.51.1.1.10xbbf2Standard query (0)spirittunek.storeA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.320127010 CEST192.168.2.51.1.1.10xb3b3Standard query (0)licendfilteo.siteA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.400800943 CEST192.168.2.51.1.1.10x95d9Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 8, 2024 04:12:01.933909893 CEST1.1.1.1192.168.2.50x8f8aName error (3)clearancek.sitenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:01.946373940 CEST1.1.1.1192.168.2.50xba29Name error (3)mobbipenju.storenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:01.956362963 CEST1.1.1.1192.168.2.50x208aName error (3)eaglepawnoy.storenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:01.971537113 CEST1.1.1.1192.168.2.50x99e4Name error (3)dissapoiznw.storenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.021172047 CEST1.1.1.1192.168.2.50x5d90Name error (3)studennotediw.storenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.157159090 CEST1.1.1.1192.168.2.50x33fcName error (3)bathdoomgaz.storenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.318748951 CEST1.1.1.1192.168.2.50xbbf2Name error (3)spirittunek.storenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.332026005 CEST1.1.1.1192.168.2.50xb3b3Name error (3)licendfilteo.sitenonenoneA (IP address)IN (0x0001)false
                    Oct 8, 2024 04:12:02.407969952 CEST1.1.1.1192.168.2.50x95d9No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                    • steamcommunity.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.549704104.102.49.2544433356C:\Users\user\Desktop\file.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 02:12:03 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                    Connection: Keep-Alive
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Host: steamcommunity.com
                    2024-10-08 02:12:03 UTC1870INHTTP/1.1 200 OK
                    Server: nginx
                    Content-Type: text/html; charset=UTF-8
                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                    Cache-Control: no-cache
                    Date: Tue, 08 Oct 2024 02:12:03 GMT
                    Content-Length: 25489
                    Connection: close
                    Set-Cookie: sessionid=9be4736368c59fb55776a050; Path=/; Secure; SameSite=None
                    Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                    2024-10-08 02:12:03 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                    2024-10-08 02:12:03 UTC10975INData Raw: 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 70 6f 70 75 70 5f 6d 65 6e 75 5f 69 74 65 6d 20 74 69 67 68 74 22 20 68 72 65 66 3d 22 3f 6c 3d 74 68 61 69 22 20 6f 6e 63 6c 69 63 6b 3d 22 43 68 61 6e 67 65 4c 61 6e 67 75 61 67 65 28 20 27 74 68 61 69 27 20 29 3b 20 72 65 74 75 72 6e 20 66 61 6c 73 65 3b 22 3e e0 b9 84 e0 b8 97 e0 b8 a2 20 28 54 68 61 69 29 3c 2f 61 3e 0d 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 70 6f 70 75 70 5f 6d 65 6e 75 5f 69 74 65 6d 20 74 69 67 68 74 22 20 68 72 65 66 3d 22 3f 6c 3d 62 75 6c 67 61 72 69 61 6e 22 20 6f 6e 63 6c 69 63 6b 3d 22 43 68 61 6e 67 65 4c 61 6e 67 75 61 67 65 28 20 27 62 75 6c 67 61 72 69 61 6e 27 20 29 3b 20 72 65 74 75 72 6e 20 66 61
                    Data Ascii: <a class="popup_menu_item tight" href="?l=thai" onclick="ChangeLanguage( 'thai' ); return false;"> (Thai)</a><a class="popup_menu_item tight" href="?l=bulgarian" onclick="ChangeLanguage( 'bulgarian' ); return fa


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:22:11:59
                    Start date:07/10/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0x240000
                    File size:1'900'032 bytes
                    MD5 hash:6E6FB447ECEAA1EB52C8777A6F9AA897
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:0.8%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:60%
                      Total number of Nodes:50
                      Total number of Limit Nodes:5
                      execution_graph 20954 2864b8 20956 2863f2 20954->20956 20955 28646e 20956->20955 20958 285bb0 LdrInitializeThunk 20956->20958 20958->20955 20959 24edb5 20962 24edd0 20959->20962 20963 24fca0 20962->20963 20966 24fcdc 20963->20966 20964 24ef70 20966->20964 20967 283220 20966->20967 20968 2832ac 20967->20968 20969 2832a2 RtlFreeHeap 20967->20969 20970 283236 20967->20970 20968->20964 20969->20968 20970->20969 20976 24d110 20980 24d119 20976->20980 20977 24d2ee ExitProcess 20978 24d2e9 20983 2856e0 FreeLibrary 20978->20983 20980->20977 20980->20978 20982 250b40 FreeLibrary 20980->20982 20982->20978 20983->20977 20940 42f205 20941 42f340 20940->20941 20942 430b78 RegOpenKeyA 20941->20942 20943 430b9f RegOpenKeyA 20941->20943 20942->20943 20944 430b95 20942->20944 20945 430bbc 20943->20945 20944->20943 20946 430c00 GetNativeSystemInfo 20945->20946 20947 430c0b 20945->20947 20946->20947 20989 2899d0 20991 2899f5 20989->20991 20990 289b0e 20992 289a5f 20991->20992 20995 285bb0 LdrInitializeThunk 20991->20995 20992->20990 20996 285bb0 LdrInitializeThunk 20992->20996 20995->20992 20996->20990 20948 283202 RtlAllocateHeap 20949 27d9cb 20950 27d9fb 20949->20950 20951 27da65 20950->20951 20953 285bb0 LdrInitializeThunk 20950->20953 20953->20950 20997 25049b 21002 250227 20997->21002 20998 250455 21001 285700 2 API calls 20998->21001 20999 250308 21001->20999 21002->20998 21002->20999 21003 285700 21002->21003 21004 28571b 21003->21004 21005 285797 21003->21005 21006 28578c 21003->21006 21009 285729 21003->21009 21004->21005 21004->21006 21004->21009 21008 283220 RtlFreeHeap 21005->21008 21006->20998 21007 285776 RtlReAllocateHeap 21007->21006 21008->21006 21009->21007

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 25 24fca0-24fcda 26 24fcdc-24fcdf 25->26 27 24fd0b-24fe22 25->27 30 24fce0-24fd09 call 252690 26->30 28 24fe24 27->28 29 24fe5b-24fe8c 27->29 31 24fe30-24fe59 call 252760 28->31 32 24feb6-24fec5 call 250b50 29->32 33 24fe8e-24fe8f 29->33 30->27 31->29 41 24feca-24fecf 32->41 36 24fe90-24feb4 call 252700 33->36 36->32 43 24ffe4-24ffe6 41->43 44 24fed5-24fef8 41->44 45 2501b1-2501bb 43->45 46 24fefa 44->46 47 24ff2b-24ff2d 44->47 49 24ff00-24ff29 call 2527e0 46->49 48 24ff30-24ff3a 47->48 51 24ff41-24ff49 48->51 52 24ff3c-24ff3f 48->52 49->47 54 2501a2-2501ad call 283220 51->54 55 24ff4f-24ff76 51->55 52->48 52->51 54->45 56 24ff78 55->56 57 24ffab-24ffb5 55->57 59 24ff80-24ffa9 call 252840 56->59 60 24ffb7-24ffbb 57->60 61 24ffeb 57->61 59->57 65 24ffc7-24ffcb 60->65 63 24ffed-24ffef 61->63 66 24fff5-25002c 63->66 67 25019a 63->67 65->67 69 24ffd1-24ffd8 65->69 72 25002e-25002f 66->72 73 25005b-250065 66->73 67->54 70 24ffde 69->70 71 24ffda-24ffdc 69->71 74 24ffc0-24ffc5 70->74 75 24ffe0-24ffe2 70->75 71->70 76 250030-250059 call 2528a0 72->76 77 2500a4 73->77 78 250067-25006f 73->78 74->63 74->65 75->74 76->73 79 2500a6-2500a8 77->79 81 250087-25008b 78->81 79->67 82 2500ae-2500c5 79->82 81->67 84 250091-250098 81->84 87 2500c7 82->87 88 2500fb-250102 82->88 85 25009e 84->85 86 25009a-25009c 84->86 89 250080-250085 85->89 90 2500a0-2500a2 85->90 86->85 91 2500d0-2500f9 call 252900 87->91 92 250104-25010d 88->92 93 250130-25013c 88->93 89->79 89->81 90->89 91->88 96 250117-25011b 92->96 94 2501c2-2501c7 93->94 94->54 96->67 98 25011d-250124 96->98 99 250126-250128 98->99 100 25012a 98->100 99->100 101 250110-250115 100->101 102 25012c-25012e 100->102 101->96 103 250141-250143 101->103 102->101 103->67 104 250145-25015b 103->104 104->94 105 25015d-25015f 104->105 106 250163-250166 105->106 107 2501bc 106->107 108 250168-250188 call 252030 106->108 107->94 111 250192-250198 108->111 112 25018a-250190 108->112 111->94 112->106 112->111
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: J|BJ$V$VY^_$t
                      • API String ID: 0-3701112211
                      • Opcode ID: 2561b7811ab2ca1ed5d69e0cd68c90a5d3b5b34afe43065a351cd82643fe6eca
                      • Instruction ID: a167fe0a232f30f2268761d0d1dc9155dea669418621512f7c99615aed6cdecc
                      • Opcode Fuzzy Hash: 2561b7811ab2ca1ed5d69e0cd68c90a5d3b5b34afe43065a351cd82643fe6eca
                      • Instruction Fuzzy Hash: 23D1977452C3819BD314DF148990A2FBBE1AB92B45F18881CF8C98B252D336CD19DB97

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 177 24d110-24d11b call 284cc0 180 24d121-24d130 call 27c8d0 177->180 181 24d2ee-24d2f6 ExitProcess 177->181 185 24d136-24d15f 180->185 186 24d2e9 call 2856e0 180->186 190 24d196-24d1bf 185->190 191 24d161 185->191 186->181 193 24d1f6-24d20c 190->193 194 24d1c1 190->194 192 24d170-24d194 call 24d300 191->192 192->190 195 24d20e-24d20f 193->195 196 24d239-24d23b 193->196 198 24d1d0-24d1f4 call 24d370 194->198 199 24d210-24d237 call 24d3e0 195->199 200 24d286-24d2aa 196->200 201 24d23d-24d25a 196->201 198->193 199->196 206 24d2d6 call 24e8f0 200->206 207 24d2ac-24d2af 200->207 201->200 205 24d25c-24d25f 201->205 211 24d260-24d284 call 24d440 205->211 213 24d2db-24d2dd 206->213 212 24d2b0-24d2d4 call 24d490 207->212 211->200 212->206 213->186 216 24d2df-24d2e4 call 252f10 call 250b40 213->216 216->186
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 0024D2F0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: 4272d8d802ab1159a02e4f9df582a609818d97c4fd223dc9dc256c85d9275cbc
                      • Instruction ID: 63f8433ac3161120705f593963633038f444b1d9788c4e20ac6e3d6ee70ff43c
                      • Opcode Fuzzy Hash: 4272d8d802ab1159a02e4f9df582a609818d97c4fd223dc9dc256c85d9275cbc
                      • Instruction Fuzzy Hash: D741327452D380ABD705BF68D584A2EFBE5AF52705F148C0CE9C89B252C336E8248B67

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 222 285700-285714 223 285729-28574a 222->223 224 28571b-285722 222->224 225 28578c-285795 call 2831a0 222->225 226 2857b0 222->226 227 2857b2 222->227 228 285797-2857a5 call 283220 222->228 230 28574c-28574f 223->230 231 285776-28578a RtlReAllocateHeap 223->231 224->223 224->226 224->227 224->228 229 2857b4-2857b9 225->229 226->227 227->229 228->226 235 285750-285774 call 285b30 230->235 231->229 235->231
                      APIs
                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 00285784
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: ccec957d20f58c3e9f26b9c8a971be4944bbf4328cff9bb5d7b1b62b2b8f5112
                      • Instruction ID: 6b2bb08251ad12d7715f75aa8357d1f96f4bcb8439133e9827436090800ebd91
                      • Opcode Fuzzy Hash: ccec957d20f58c3e9f26b9c8a971be4944bbf4328cff9bb5d7b1b62b2b8f5112
                      • Instruction Fuzzy Hash: E711A37952D250EBC301EF18E844A1FFBF9AF96710F058828E4C49B251D335D820CB97

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 249 285bb0-285be2 LdrInitializeThunk
                      APIs
                      • LdrInitializeThunk.NTDLL(0028973D,005C003F,00000006,?,?,00000018,8C8D8A8B,?,?), ref: 00285BDE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                      • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                      • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                      • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 278 28695b-28696b call 284a20 281 28696d 278->281 282 286981-286a02 278->282 283 286970-28697f 281->283 284 286a04 282->284 285 286a36-286a42 282->285 283->282 283->283 288 286a10-286a34 call 2873e0 284->288 286 286a44-286a4f 285->286 287 286a85-286a9f 285->287 290 286a50-286a57 286->290 288->285 292 286a59-286a5c 290->292 293 286a60-286a66 290->293 292->290 294 286a5e 292->294 293->287 295 286a68-286a7d call 285bb0 293->295 294->287 297 286a82 295->297 297->287
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: 35222f14698e9c7322f9156922b15525608da0eeefc0b93d796b32b426002042
                      • Instruction ID: a526924b4c0f7085d8f89872620d6413c788dcf7effb995470138128b16bf071
                      • Opcode Fuzzy Hash: 35222f14698e9c7322f9156922b15525608da0eeefc0b93d796b32b426002042
                      • Instruction Fuzzy Hash: 8931ABB56293028FD718EF14D8A872BB7F1FF84344F18881DE5C6972A1E3359924CB56

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 298 25049b-250515 call 24c9f0 302 250227-25023b 298->302 303 250246-250260 298->303 304 250386-25038c 298->304 305 250440-250458 call 285700 298->305 306 250480 298->306 307 250242-250244 298->307 308 250482-250484 298->308 309 2503ec-2503f4 298->309 310 250308-25030c 298->310 311 250417-250430 298->311 312 250356 298->312 313 250311-250332 298->313 314 250370-25037e 298->314 315 2503d0-2503d7 298->315 316 250393-250397 298->316 317 250472-250477 298->317 318 25051c-25051e 298->318 319 25035f-250367 298->319 320 2503be 298->320 321 2503de-2503e3 298->321 322 250339-25034f 298->322 323 25045b-250469 call 285700 298->323 324 2503fb-250414 298->324 302->303 302->304 302->305 302->306 302->307 302->308 302->309 302->310 302->311 302->312 302->313 302->314 302->315 302->316 302->317 302->319 302->320 302->321 302->322 302->323 302->324 327 250294 303->327 328 250262 303->328 304->306 304->308 304->316 304->317 305->323 326 250296-2502bd 307->326 330 25048d-250496 308->330 309->306 309->308 309->316 309->317 309->324 310->330 311->305 312->319 313->304 313->305 313->306 313->308 313->309 313->311 313->312 313->314 313->315 313->316 313->317 313->319 313->320 313->321 313->322 313->323 313->324 314->304 315->304 315->306 315->308 315->309 315->311 315->316 315->317 315->321 315->324 332 2503a0-2503b7 316->332 317->306 325 250520-250b30 318->325 319->314 320->315 321->309 322->304 322->305 322->306 322->308 322->309 322->311 322->312 322->314 322->315 322->316 322->317 322->319 322->320 322->321 322->323 322->324 323->317 324->311 334 2502bf 326->334 335 2502ea-250301 326->335 327->326 333 250270-250292 call 252eb0 328->333 330->325 332->304 332->305 332->306 332->308 332->309 332->311 332->315 332->316 332->317 332->320 332->321 332->323 332->324 333->327 345 2502c0-2502e8 call 252e70 334->345 335->304 335->305 335->306 335->308 335->309 335->310 335->311 335->312 335->313 335->314 335->315 335->316 335->317 335->319 335->320 335->321 335->322 335->323 335->324 345->335
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf50af8356dce35a0d54c9edf668bace58f7202475c75b703585be371ff1a880
                      • Instruction ID: bc86dc935d5ed171dce00d63fb80df198393d77de89702bb66c8d9e0cd666fe3
                      • Opcode Fuzzy Hash: cf50af8356dce35a0d54c9edf668bace58f7202475c75b703585be371ff1a880
                      • Instruction Fuzzy Hash: 3C918A75211B00CFD324CF25EC98A16B7F6FF89315B118A6DE8568BAA1D731F829CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: be264d54f8fb8e2d39ed2c2b23401f6cda99d655a5bfed30455b1d8e2674ccd3
                      • Instruction ID: d3100ca53e30598fe6fe9b88484ca55f9e622333b339894313dbf6445b6a4a03
                      • Opcode Fuzzy Hash: be264d54f8fb8e2d39ed2c2b23401f6cda99d655a5bfed30455b1d8e2674ccd3
                      • Instruction Fuzzy Hash: 16717A78211701DFD7248F21EC98B16B7F6FF49315F1089ADE8468B662D731E829CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ccbf923b75d8f63168cbd6dfa6511eeb1090b7bd481f8e1f35c655e0db414dd3
                      • Instruction ID: 334eaa40b13d4505f08bf5425e6b30cb02b0962292cbf688da6ff72b66be755b
                      • Opcode Fuzzy Hash: ccbf923b75d8f63168cbd6dfa6511eeb1090b7bd481f8e1f35c655e0db414dd3
                      • Instruction Fuzzy Hash: 2D41C33822A301ABD714EF55E890B3FF7E5EB85714F18882DF58A97291D331E861CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 29329a1277006f655a23f8daef56378bea2db0e21e2c05d3d538fa9e320d806c
                      • Instruction ID: d22109256ecb1f317c8057e857abe700132ef5e2d43cf0b83e39c48b4af45ccd
                      • Opcode Fuzzy Hash: 29329a1277006f655a23f8daef56378bea2db0e21e2c05d3d538fa9e320d806c
                      • Instruction Fuzzy Hash: E531E67865A302BBE624EF04DD8AF3EB7A5FB80B15F64850CF181672D1D370AC218B52

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 140 42f205-430b76 145 430b78-430b93 RegOpenKeyA 140->145 146 430b9f-430bba RegOpenKeyA 140->146 145->146 147 430b95 145->147 148 430bd2-430bfe 146->148 149 430bbc-430bc6 146->149 147->146 152 430c00-430c09 GetNativeSystemInfo 148->152 153 430c0b-430c15 148->153 149->148 152->153 154 430c21-430c2f 153->154 155 430c17 153->155 157 430c31 154->157 158 430c3b-430c42 154->158 155->154 157->158 159 430c55 158->159 160 430c48-430c4f 158->160 161 431bae-431bb5 159->161 160->159 160->161 162 4329c5-4329d6 161->162 163 431bbb-43245e 161->163 163->162
                      APIs
                      • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 00430B8B
                      • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 00430BB2
                      • GetNativeSystemInfo.KERNELBASE(?), ref: 00430C09
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: Open$InfoNativeSystem
                      • String ID:
                      • API String ID: 1247124224-0
                      • Opcode ID: d9dce487079e9693c5a13b08d44b314ff43eb9e71e5344a205ea210cec0a2818
                      • Instruction ID: db14a5af43f95fdb5abfa398c9bdfd3f1a23449a7d74c8a4d5ea550106c125ae
                      • Opcode Fuzzy Hash: d9dce487079e9693c5a13b08d44b314ff43eb9e71e5344a205ea210cec0a2818
                      • Instruction Fuzzy Hash: F2418CB150810EDFDF11DF60C848BEF7AA5EB19310F041626E98682A51E7BA5CB4DB4E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 239 283220-28322f 240 2832ac-2832b0 239->240 241 2832a0 239->241 242 2832a2-2832a6 RtlFreeHeap 239->242 243 283236-283252 239->243 241->242 242->240 244 283254 243->244 245 283286-283296 243->245 246 283260-283284 call 285af0 244->246 245->241 246->245
                      APIs
                      • RtlFreeHeap.NTDLL(?,00000000), ref: 002832A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: FreeHeap
                      • String ID:
                      • API String ID: 3298025750-0
                      • Opcode ID: cd226b19c890f9ff486b63c1d213622e070e27a24aa85f00a0ce424c553017f3
                      • Instruction ID: 422e7d5be460f462e9e96af9ea312846321eae4dd53b2283c9ab4372bc48837c
                      • Opcode Fuzzy Hash: cd226b19c890f9ff486b63c1d213622e070e27a24aa85f00a0ce424c553017f3
                      • Instruction Fuzzy Hash: 38016D3450D2409BC701EF18E889A1ABBE8EF4AB10F05495CE5C98B361D335DD60DB96

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 250 283202-283211 RtlAllocateHeap
                      APIs
                      • RtlAllocateHeap.NTDLL(?,00000000), ref: 00283208
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: c2a99cd9b3c02961427ce85357d58d06a33ad0426c87db7b91fcf79f62780ccf
                      • Instruction ID: 194f1462cbeff2d4d40ca6dc7adb15d1194b786343a5280c7efba5328ca75442
                      • Opcode Fuzzy Hash: c2a99cd9b3c02961427ce85357d58d06a33ad0426c87db7b91fcf79f62780ccf
                      • Instruction Fuzzy Hash: 51B012300800005FDA041B00FC0EF007510EB00605F800050A100040B1D1615864D554
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: %*+($()./$89&'$89>?$:WUE$<=2$<=:;$@ONM$AR$D$DCBA$LKJI$QNOL$T$WP$`Y^_$`onm$dcba$lkji$mjkh$tsrq$tuJK$xgfe$|
                      • API String ID: 2994545307-1418943773
                      • Opcode ID: 915fb03cd6e3e07b709fb7c780149e18e306464dc1cf3def5d257ab40e8b8e4a
                      • Instruction ID: 2a8de016daff6978e3cb4bfcba58e13fe80281e808cf638aec3a66fb0f4901d0
                      • Opcode Fuzzy Hash: 915fb03cd6e3e07b709fb7c780149e18e306464dc1cf3def5d257ab40e8b8e4a
                      • Instruction Fuzzy Hash: 79F2AAB05193829FD774CF14C484BABBBE6BFD5305F14482CE8C98B281E73199A8CB56
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+($3<$:$Cx$`tii$aenQ$f@~!$fedc$ggxz$mlc@${l`~$|}&C
                      • API String ID: 0-786070067
                      • Opcode ID: 46d0fcd074eb2d20faff376acd99288bfc163a843f3b3b88886029086a47668d
                      • Instruction ID: 2702f8c6fdf4fbf20525dfc8ec9b5a1df0a756718c10d11b2e5fd8b8bc127885
                      • Opcode Fuzzy Hash: 46d0fcd074eb2d20faff376acd99288bfc163a843f3b3b88886029086a47668d
                      • Instruction Fuzzy Hash: 1A33CC70524B81CBD725CF38C590B62BBE1BF16304F58899DD4DA8BB92C735E816CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %e6g$(a*c$=]$?m,o$CG$Gt$JG$N[$WH$]{$hi$kW$/)$S]$WQ$_Y$sm
                      • API String ID: 0-1131134755
                      • Opcode ID: c05deffdf8712f47e41fdfbeb8157feb83605b91cc62b2f019f809bd27ae255e
                      • Instruction ID: 6c8d87cc9f6cb3b1a13c328f406316d50b326c3da3a424b5ecdaf64669856c0d
                      • Opcode Fuzzy Hash: c05deffdf8712f47e41fdfbeb8157feb83605b91cc62b2f019f809bd27ae255e
                      • Instruction Fuzzy Hash: E852C7B444D385CAE270CF25D581B8EBAF1BB92740F608A1DE5ED5B255DB708085CF93
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: !E4G$,A&C$2A"_$8;$;IJK$?M0K$B7U1$B?Q9$G'M!$G+X5$L3Y=$O+f)$T#a-$X/R)$pq$z=Q?
                      • API String ID: 0-655414846
                      • Opcode ID: 7c391a15ce3579ad47396eccbd5b4b28336ecaeb36d518f13a8f881c9946117d
                      • Instruction ID: 17ebfe5c7d17639740e3de921b97fd917f52f2dd681e1999562d4e24175e5a71
                      • Opcode Fuzzy Hash: 7c391a15ce3579ad47396eccbd5b4b28336ecaeb36d518f13a8f881c9946117d
                      • Instruction Fuzzy Hash: A8F150B0528381ABD310DF15D880A2BBBF8FB86B48F544D1CF4D59B252D734DA98CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: &$%*+($)IgK$,Q?S$-M2O$<Y.[$=]+_$Y9N;$hX]N$n\+H$r&$upH}${E$&
                      • API String ID: 0-524279257
                      • Opcode ID: 8c2e30e6c414a64b7441a4aa2144a62795c3e213792fe6188a5aff9659d4d144
                      • Instruction ID: 9f42948e2b9f69a8ea1b77a4578655f4f60df730a9dbe69cc43b1cbb1a52c3ad
                      • Opcode Fuzzy Hash: 8c2e30e6c414a64b7441a4aa2144a62795c3e213792fe6188a5aff9659d4d144
                      • Instruction Fuzzy Hash: A0922775E10216CFDB08CF69D8417AEBBB2FF49310F298169E416AB391D731AD61CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %W( $-ErL$.1|$3]Cw$;"{$Gb5o$`>o$~yo$0=s
                      • API String ID: 0-1149440118
                      • Opcode ID: 65691bb8e7ed72d98be3efd3e9e9e73757ed11ce133277f932cd75d5468ae97d
                      • Instruction ID: 730d6f2a578ba79c5543f80e9d7ff1c4772b494b60456c867dd1951e4b9de690
                      • Opcode Fuzzy Hash: 65691bb8e7ed72d98be3efd3e9e9e73757ed11ce133277f932cd75d5468ae97d
                      • Instruction Fuzzy Hash: 6FB2E5F36082049FE7046E2DEC8567AFBE9EF94720F1A493DEAC4C3744E63598058697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+($&> &$,#15$9.5^$cah`$gce/$qrqp${
                      • API String ID: 0-4102007303
                      • Opcode ID: 616487bfb82ea15f46c3cc723ef5d0529fa8538dace64b43bd23c0bed9618b7b
                      • Instruction ID: 4832dab1c2b3c166a5f7773bb335d0a9f5efa183aeb2b7ff392ec7839f8d70e3
                      • Opcode Fuzzy Hash: 616487bfb82ea15f46c3cc723ef5d0529fa8538dace64b43bd23c0bed9618b7b
                      • Instruction Fuzzy Hash: D162A8B16183818FD330CF14D895BABB7E1FF96314F08492DE49A8B681E77599A0CB53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$gfff$gfff$gfff
                      • API String ID: 0-2517803157
                      • Opcode ID: 65ee87e200b7d7c60c95ffd3bce823d6f354242174027f6bf22f66decbff9ac4
                      • Instruction ID: 8417cfd6d98b477e48f7ec1b0e0d866fa51e8d04e057992039a571c26672853d
                      • Opcode Fuzzy Hash: 65ee87e200b7d7c60c95ffd3bce823d6f354242174027f6bf22f66decbff9ac4
                      • Instruction Fuzzy Hash: 88D204316283528FD71CCE29C49036ABBE2AFD5314F188A2DF899C7391D774D959CB82
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: /kv$?8$Qr?$Z_io$\#\$^#\$o }O
                      • API String ID: 0-643045077
                      • Opcode ID: 880426d716e804a236f29a261e0de079aefd94b4e4c23d641feeceb88cd1ffb4
                      • Instruction ID: fe3305b6626e700b2c2a160a5539b25d1b1fa0c5fd1fe1c8c2dce77260928d8a
                      • Opcode Fuzzy Hash: 880426d716e804a236f29a261e0de079aefd94b4e4c23d641feeceb88cd1ffb4
                      • Instruction Fuzzy Hash: 84B208B360C204AFE3046E2DEC8567AFBE9EF94720F16493DE6C4D3744EA3598058697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: !b.$O<tv$TX7$`rwW$pC77$pa_?
                      • API String ID: 0-956097245
                      • Opcode ID: cff401954f9aeb36e56251ddc7bf2fed30c5b9f746bd5fa2ecb16c22f6c1313d
                      • Instruction ID: f3b7ff1b40f1586334b9007bc1cab6b43f2b0012c195c55dcc6445f6d6f01ee2
                      • Opcode Fuzzy Hash: cff401954f9aeb36e56251ddc7bf2fed30c5b9f746bd5fa2ecb16c22f6c1313d
                      • Instruction Fuzzy Hash: 3AB23AF3A0C204AFE3146E2DEC8567AFBE9EBD4320F1A453DEAC5C7744E93558018696
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: Su>$T%{$j]G$qdN$q4$aK{
                      • API String ID: 0-3495625197
                      • Opcode ID: 07fce7c77fe483544330f8e18e908d409b6a2fd13cb6502af5852919f83c1bc8
                      • Instruction ID: c46019eaae5fb648b7c5dfcfde8256e53c06e972b53c1136568f67256076c599
                      • Opcode Fuzzy Hash: 07fce7c77fe483544330f8e18e908d409b6a2fd13cb6502af5852919f83c1bc8
                      • Instruction Fuzzy Hash: E7B2F9F390C2049FE304AE2DEC8567ABBE5EF94720F1A493DEAC4C3744E53598158697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: #fw$9d~Q$@Vl~$dLQ$%=$a{K
                      • API String ID: 0-3929880288
                      • Opcode ID: ee7042dfba16342d8e44db66381b52be51ffd3a0ca12c5918598a4d6c16d0206
                      • Instruction ID: 8a022d93313ffb727a7cab4c9891b223a97bd1a1f057ba265ece39424d9d2142
                      • Opcode Fuzzy Hash: ee7042dfba16342d8e44db66381b52be51ffd3a0ca12c5918598a4d6c16d0206
                      • Instruction Fuzzy Hash: 638236F3A0C2049FE3046E2DEC8567ABBE9EF94720F1A453DEAC4C7744E93598058796
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: @eo=$Co}$Co}$FXiK$I+;r$m&_O
                      • API String ID: 0-1309824505
                      • Opcode ID: c4c015e02602a2d72c1577bb1644df339bdb8316978be4261db1d05155f2359c
                      • Instruction ID: 474cc1bb66acf26ac0351948b8866e739dd3a950b28f90b4d5c3d03dd9e04817
                      • Opcode Fuzzy Hash: c4c015e02602a2d72c1577bb1644df339bdb8316978be4261db1d05155f2359c
                      • Instruction Fuzzy Hash: B772E7F36082049FE3046E2DEC8567AF7EAEFD4720F1A893DE6C4C7744E63598058696
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: |ew$"-c;$Yp_$epz:$,6
                      • API String ID: 0-2588834461
                      • Opcode ID: 9a6350fd476a37b2f150a4b19538e25abd5f3bb1fe437701bef53689ea509709
                      • Instruction ID: d14da70acc91631955206ea8905fcd1b0d71b0e00288a7fe3b6c6756944f0c0d
                      • Opcode Fuzzy Hash: 9a6350fd476a37b2f150a4b19538e25abd5f3bb1fe437701bef53689ea509709
                      • Instruction Fuzzy Hash: 3EB217F360C2009FE3086E2DEC9567AFBE9EB94320F16893DE6C5C7744EA3558418697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: Cje$F9{$Lo${7>?$wz>
                      • API String ID: 0-1300894068
                      • Opcode ID: 333d5821e80525150769c513cb3b1420ee1583cac9153cc7a0bc5d7943702cd4
                      • Instruction ID: 8b7bab775def7803ac14f8fab6e706c3a5a087668624d95bdec93d8a7d70a562
                      • Opcode Fuzzy Hash: 333d5821e80525150769c513cb3b1420ee1583cac9153cc7a0bc5d7943702cd4
                      • Instruction Fuzzy Hash: FDB2F4F390C2049FE304AE29EC8567AFBE5EF94320F1A493DEAC5C7344E63598458697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: Q*~$^d\$e9ld${K~k$Ct
                      • API String ID: 0-2449014224
                      • Opcode ID: 87bf8be04b11c484a4dded9d81beecbe23907aa0bfc8f49ba10358a27fc81e4f
                      • Instruction ID: fa32fba7e47a194a8b5efc17ff266d6fe9a51e4f79ca264d38c1b42af687b961
                      • Opcode Fuzzy Hash: 87bf8be04b11c484a4dded9d81beecbe23907aa0bfc8f49ba10358a27fc81e4f
                      • Instruction Fuzzy Hash: 07A2E7F360C2009FE708AE29EC8577ABBE5EF98720F164A3DE6D5C7740E63558018697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$0$0$@$i
                      • API String ID: 0-3124195287
                      • Opcode ID: 197a87bd8b3e997d360e6f20540d88087081c51f41e0c856f668edeb761fbeec
                      • Instruction ID: 0a6bba469b0990ad69161bbd321156cd5b3a514a7bed4fc15092fddccb119bec
                      • Opcode Fuzzy Hash: 197a87bd8b3e997d360e6f20540d88087081c51f41e0c856f668edeb761fbeec
                      • Instruction Fuzzy Hash: 4662E07162C3828BC31DCF29C49036ABBE1AFD5348F588A2DF8D987291D774D959CB42
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: +$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff
                      • API String ID: 0-1123320326
                      • Opcode ID: e26ef9d4a435e532e09d341810b69049c5b75593d1831329f84181f847821df8
                      • Instruction ID: 017187a836c1aa50b9785fc1a1e402112bd918d6eaea7191d2b4956cc1d051f2
                      • Opcode Fuzzy Hash: e26ef9d4a435e532e09d341810b69049c5b75593d1831329f84181f847821df8
                      • Instruction Fuzzy Hash: 1DF1C03061C3828FC719CE29C48436AFBE2AFD9304F588A6DE4D987352D774D959CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff
                      • API String ID: 0-3620105454
                      • Opcode ID: f984d811f1caf3731b0a164ed869bda303d0a3654047a8fb94f8cb4680087914
                      • Instruction ID: 83d43ffd4805ea057976bf23ab71e09ad8042f8f4438b4f9f4d11b2aac747bcd
                      • Opcode Fuzzy Hash: f984d811f1caf3731b0a164ed869bda303d0a3654047a8fb94f8cb4680087914
                      • Instruction Fuzzy Hash: 52D1AE316187828FC719CF29C48026AFBE2AFD9308F48CA6DE4D987356D634D959CB52
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: a|$b&&$hu$lc$sj
                      • API String ID: 0-1906391715
                      • Opcode ID: a1b7e3aac258358012007e248843ccf94c8e9e7b7988b8e28bf10abc42e1caae
                      • Instruction ID: a889e61131312fc13d6b25bc38163e98217c394b0fa4dd30327c834e3b8cec5b
                      • Opcode Fuzzy Hash: a1b7e3aac258358012007e248843ccf94c8e9e7b7988b8e28bf10abc42e1caae
                      • Instruction Fuzzy Hash: DAA19CB0428341CBC320DF18C891A2BB7F4FF96354F549A0CE8D59B291E739D9A5CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: :$NA_I$m1s3$uvw
                      • API String ID: 0-3973114637
                      • Opcode ID: 4d66eacd5f6bc1bb386b778fb91d432b00877296cdfaaebc91596d9fd7a1532a
                      • Instruction ID: c0e1c9c97776b159bd2678d80927eddce7ecf934fc77a34efe92c37e7f9ce150
                      • Opcode Fuzzy Hash: 4d66eacd5f6bc1bb386b778fb91d432b00877296cdfaaebc91596d9fd7a1532a
                      • Instruction Fuzzy Hash: A332CDB0528381DFD301DF29D884B2ABBE5BB86350F14895CF5D98B292D335D929CF52
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+($;z$p$ss
                      • API String ID: 0-2391135358
                      • Opcode ID: 7012f4d12766b3bab445768601ab30421a6dbb2aeefae39700147bd9b96afd67
                      • Instruction ID: e91c4f8e680c602b58014c4e5871904a43c5425ef33b98bfa3f1ec4567a5c17b
                      • Opcode Fuzzy Hash: 7012f4d12766b3bab445768601ab30421a6dbb2aeefae39700147bd9b96afd67
                      • Instruction Fuzzy Hash: 97026DB4820B009FD760EF24D986756BFF4FF05301F50495DE89A8B685E370A429CFA6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: #'$CV$KV$T>
                      • API String ID: 0-95592268
                      • Opcode ID: adeb613dbc9b712e369d1f6da0af99505cdedcfcb6da6719a9130c206513cba5
                      • Instruction ID: 752fe9688602e43b8fa04eb929fe89e9fa8c97b5b99f774696d7a0372c43a5bf
                      • Opcode Fuzzy Hash: adeb613dbc9b712e369d1f6da0af99505cdedcfcb6da6719a9130c206513cba5
                      • Instruction Fuzzy Hash: 3D8156B48117499BCB20DF96D28515EBFB1FF16300F60460CE486ABA55D330AA65CFE3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: (g6e$,{*y$4c2a$lk
                      • API String ID: 0-1327526056
                      • Opcode ID: 4657f918c980dfa719f95f0602d7a1f35883a501692ece0a75f4b5d13010780d
                      • Instruction ID: 3cc57b27c9eab4af126ff30338124d23f9c7883c79b33870ee632562bdaa0957
                      • Opcode Fuzzy Hash: 4657f918c980dfa719f95f0602d7a1f35883a501692ece0a75f4b5d13010780d
                      • Instruction Fuzzy Hash: E94194B4418382CAD7209F20D804BABB7F4FF86345F14595EE9C8A7260EB32D954CF96
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 3?o$o%y\$o%y\
                      • API String ID: 0-438721638
                      • Opcode ID: 2787dea714d37f96005b085f0d47cce79552181a23a424cef09a4016d89f2927
                      • Instruction ID: 7f2e6f7a7c957549d76b06c4cfa2a1d22ff46290ea6cd5bb2ff50edd0109a95f
                      • Opcode Fuzzy Hash: 2787dea714d37f96005b085f0d47cce79552181a23a424cef09a4016d89f2927
                      • Instruction Fuzzy Hash: 24E1D3F250C600AFE304AF29DC8577AFBE5EF98720F16892DE6C487744E63598118B57
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+($%*+($~/i!
                      • API String ID: 0-4033100838
                      • Opcode ID: 8ee510c286c19fd1424872105d934a83d33a032f82c3a5cdb2b910bbcf545665
                      • Instruction ID: c12d0775cb7e99ed3fe753fff06dabccc92d719984e325f7dbd4e4f04117fbc7
                      • Opcode Fuzzy Hash: 8ee510c286c19fd1424872105d934a83d33a032f82c3a5cdb2b910bbcf545665
                      • Instruction Fuzzy Hash: 3BE1CAB5929341DFE320AF65E884B2ABBF9FB85340F54882DE1C887251D731D860CF92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: )$)$IEND
                      • API String ID: 0-588110143
                      • Opcode ID: 2a8abea39be8037785843a3942f83fb9db63d50fec3eb6cc8f4d00abc861db7c
                      • Instruction ID: 90ccffaebe2629005e4dd1f57eb832111ea3a4334f057b299ffe131cf563bfc1
                      • Opcode Fuzzy Hash: 2a8abea39be8037785843a3942f83fb9db63d50fec3eb6cc8f4d00abc861db7c
                      • Instruction Fuzzy Hash: 44E1E2B1A287029FE314CF28C84572EBBE4BB94314F14492DF99597391DBB5E924CBC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: a)|$?^
                      • API String ID: 0-3142012609
                      • Opcode ID: b72c463901f4f628561236e33790bcb6a60d3bd2d901f694f44b098174635bf6
                      • Instruction ID: 05a6d7b50048671913d4872f2520f8e38e9785d32caccd2fee7ee5c054b17140
                      • Opcode Fuzzy Hash: b72c463901f4f628561236e33790bcb6a60d3bd2d901f694f44b098174635bf6
                      • Instruction Fuzzy Hash: D0424BF3A086009FE300AE2DDC8567BB7EAEFD4720F1A853DE6C4D7744E93598058696
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+($f
                      • API String ID: 0-2038831151
                      • Opcode ID: df5774067835f6c64510a4d0c6a9ded1f1a75a7b50ede2eaefc28626b43c3183
                      • Instruction ID: ce9fd406b4e5b319adaa0b12af4991d32258ceb5983dea373dea91ae5d1efbd6
                      • Opcode Fuzzy Hash: df5774067835f6c64510a4d0c6a9ded1f1a75a7b50ede2eaefc28626b43c3183
                      • Instruction Fuzzy Hash: 5B12DF7961A3428FC714EF18C880B2EBBE6FBC9314F588A2DF49497291D735D914CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: dg$hi
                      • API String ID: 0-2859417413
                      • Opcode ID: d1906a718f3bbd6db3a0307d13fe25248b22059dba204bd08bbe6f9339575299
                      • Instruction ID: 2b3bf7fb928b0e14bbbc389514c8f2b9e389496f5163a8e72fb8f2ece17e3e4e
                      • Opcode Fuzzy Hash: d1906a718f3bbd6db3a0307d13fe25248b22059dba204bd08bbe6f9339575299
                      • Instruction Fuzzy Hash: 3CF1947162C341EFE304CF24D895B6ABBE5FB85344F24892DF1998B2A1C734D854CB52
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: Inf$NaN
                      • API String ID: 0-3500518849
                      • Opcode ID: 3224fc01754d5a0796ddf5a7dd8210643fd501549f7088f0cb925e941240d41a
                      • Instruction ID: 94ba4c9182d6ee092238878193fcbd90bf742801a3d8fe1d9282c28a17f5813c
                      • Opcode Fuzzy Hash: 3224fc01754d5a0796ddf5a7dd8210643fd501549f7088f0cb925e941240d41a
                      • Instruction Fuzzy Hash: 51D1E671A283129BC708CF28C88061EF7E5FBC8750F258A2DF99997391E775DD158B82
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: (K^$Soc
                      • API String ID: 0-1812260406
                      • Opcode ID: 0a6497748bfbb4e3778adcec77ecf61103be734a3796a5892c609422eecf2371
                      • Instruction ID: ce36e17099261c64df457a576f432b021fecb1dbf804288a31c31dc68da87ff9
                      • Opcode Fuzzy Hash: 0a6497748bfbb4e3778adcec77ecf61103be734a3796a5892c609422eecf2371
                      • Instruction Fuzzy Hash: 2C71F7F3A1C3089FE745AE29EC9573AB7D6EB54320F16493DEAC4C7340EA3598448786
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: &mu.$n==
                      • API String ID: 0-1860171379
                      • Opcode ID: 6b6b3b84b5f98bdf2781a195bf9f73330a34431b597b9d67dee7fa831115ab6c
                      • Instruction ID: c72ce67ae581646267ea439c32f77b4c3660c1c756ee8630ebd8ff8aac762d11
                      • Opcode Fuzzy Hash: 6b6b3b84b5f98bdf2781a195bf9f73330a34431b597b9d67dee7fa831115ab6c
                      • Instruction Fuzzy Hash: 2A615CB3A0A2145FE3046E2DDD5577AFBE9EFD4720F1A453EE6C583784E93158008683
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: BaBc$Ye[g
                      • API String ID: 0-286865133
                      • Opcode ID: a77b8814013e3a6c30c275916ef14160662e23aadd6de6093784286979a90212
                      • Instruction ID: b3aa7e1e36e5097c1901419007ebc70dc885b80f3d43f0def15ac71737a9a04e
                      • Opcode Fuzzy Hash: a77b8814013e3a6c30c275916ef14160662e23aadd6de6093784286979a90212
                      • Instruction Fuzzy Hash: DE51CDB16283828BD331CF14C481BABB7E4FF96310F18491DE49A8B691E3749990DB57
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %1.17g
                      • API String ID: 0-1551345525
                      • Opcode ID: de03a093ed0b81c592bcce4a761c2cbe0cc792d89c89b2291755a4606f4f8fdf
                      • Instruction ID: abfe45385b6a6b2ef0ba1ed81f23c9f7f3599efa2850ed674256de60db86c7dc
                      • Opcode Fuzzy Hash: de03a093ed0b81c592bcce4a761c2cbe0cc792d89c89b2291755a4606f4f8fdf
                      • Instruction Fuzzy Hash: 1C22C5B6928B628BE7198F18D440326FBA2AFE1304F1D856DD8D94B343E7B1DC65C741
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: 1e36e4a90a5bcd9904d9a2755a98640d2f51fe7f53356f7c076c40d918f289ea
                      • Instruction ID: da5db4b9b9548b567539b641789873d11da1a64be3c1e47fc14749c20674d564
                      • Opcode Fuzzy Hash: 1e36e4a90a5bcd9904d9a2755a98640d2f51fe7f53356f7c076c40d918f289ea
                      • Instruction Fuzzy Hash: E2F12771A183524FD728CE2CC49162BBBE5AFC5350F18C96DE89D87382D634DD25CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: 4586a43af7d1611ac11e60458cdf18d8f9b84852cf6385849614bc9c547f28f6
                      • Instruction ID: 70ec0b34e182e5824eedf4fe1d7ab4f8de28a0d6d6cff3b900d98d0a27771759
                      • Opcode Fuzzy Hash: 4586a43af7d1611ac11e60458cdf18d8f9b84852cf6385849614bc9c547f28f6
                      • Instruction Fuzzy Hash: B1E1CB71628306CBC315DF29D89056EB7F2FF98781F54891CE8C587260E331E9A9CB82
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: c637f5fa0df82fd6b8a26bc8cd3ca810ca8b42e4b4e5547358f06e31c3c23d04
                      • Instruction ID: 2e0e97429cdcbe247e35fb42646e4b10bf76cccb3af4d4e57c5ff71d16536502
                      • Opcode Fuzzy Hash: c637f5fa0df82fd6b8a26bc8cd3ca810ca8b42e4b4e5547358f06e31c3c23d04
                      • Instruction Fuzzy Hash: B5F1D275A21701CFC724DF28E885A26B3F6FF48315B54892DD89787A91EB30F929CB44
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: caaed880a94585fa4e180c07f53c5f614ac7443dc614b93005e7dd29650a9b37
                      • Instruction ID: 501d77693e1ca168c7b8e44650d8f38fb03f112cfd3baa09d3d91f9cf753b27c
                      • Opcode Fuzzy Hash: caaed880a94585fa4e180c07f53c5f614ac7443dc614b93005e7dd29650a9b37
                      • Instruction Fuzzy Hash: 48C1E1B1528201ABD710EF14D881A2BB7F5EF92714F08495CF8C997291E735ECA4CBA3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: bafbfb4b0cbe870aa0ccade011232bc78bad2b7077d640fa904500c8c7402c61
                      • Instruction ID: c33998172480afb72e01d6ecedb11d51b224a6998ed1f8ba9e67fed08a6c8730
                      • Opcode Fuzzy Hash: bafbfb4b0cbe870aa0ccade011232bc78bad2b7077d640fa904500c8c7402c61
                      • Instruction Fuzzy Hash: DFD1D271628302DFD704DF64EC94A2AB7E5FF89304F49486DE88687391DB35E990CB61
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: BI%
                      • API String ID: 0-3873480887
                      • Opcode ID: 537d960a91fe78496f529443a377d95ade8f43af0b977763a098275220baaac5
                      • Instruction ID: f348ffd906a713b7bcdc0789b9b36bd53fdc1f0e52eee3da39a06f9863c67e40
                      • Opcode Fuzzy Hash: 537d960a91fe78496f529443a377d95ade8f43af0b977763a098275220baaac5
                      • Instruction Fuzzy Hash: 9BE111B5511B008FD365DF28E996B97B7E1FF0A709F04881DE8AAC7652E731B824CB14
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: P
                      • API String ID: 0-3110715001
                      • Opcode ID: ffb82c5ec9d4c83a0894256e78079232b6c1623a5fe0148fb97cc38862f94538
                      • Instruction ID: 14445c15bbe6d89dd4e67f324c7dff9387fef33e60f8ed528ca29db7a7c57118
                      • Opcode Fuzzy Hash: ffb82c5ec9d4c83a0894256e78079232b6c1623a5fe0148fb97cc38862f94538
                      • Instruction Fuzzy Hash: 41D114369182614FC725DE18D89072EB7E1EB80718F55862CE8B5AB3C4CB71DC16C7C1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: "p(
                      • API String ID: 0-3724712592
                      • Opcode ID: f0d8f99e87d06f921794f813a484d390771ddc2809d65ec21f20b0dac8432ec4
                      • Instruction ID: 6f2836ddd05ea4fedf997bb38f6ccf3c34e825690d7cf9f1cd894c0aa13023bf
                      • Opcode Fuzzy Hash: f0d8f99e87d06f921794f813a484d390771ddc2809d65ec21f20b0dac8432ec4
                      • Instruction Fuzzy Hash: 72D10E3661C751CFC714CF78E8C452ABBE2AB99314F098A6EE891D73A1D330DA44CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: %*+(
                      • API String ID: 2994545307-3233224373
                      • Opcode ID: 71d04d158d13cb2c2cebfda8e843a8d4451017fede94b5aef691bf9a55d23b97
                      • Instruction ID: e3cc7b969152f15898bd88e42bc4e2cc0dcb33e352015801d0b5ec89f7e4c62e
                      • Opcode Fuzzy Hash: 71d04d158d13cb2c2cebfda8e843a8d4451017fede94b5aef691bf9a55d23b97
                      • Instruction Fuzzy Hash: 0AB10270A293468BD714EF58D880B3BBBF6EF95340F24482DE5C58B251E335D8A5CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,
                      • API String ID: 0-3772416878
                      • Opcode ID: 6a3fef2072c4110c7e08f213014c8aa891b97c95317c3c670d38149bab24221c
                      • Instruction ID: 84e7ad84ea958b4e47cfa8973751b8126a2f2d56b5aa1bfc3e2c5d2e6e81eb59
                      • Opcode Fuzzy Hash: 6a3fef2072c4110c7e08f213014c8aa891b97c95317c3c670d38149bab24221c
                      • Instruction Fuzzy Hash: 90B118711083819FD325CF18C88061BBBE1AFA9704F488E2DF5D997782D671EA18CB57
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: 29344a20aca69f047023e4e60aef1606a1465d6d69c6d0cf1deaa840e1f33c6b
                      • Instruction ID: d1f4df6e656a07cb94942f534e68f56031671886e51dfbed2e6b5044a9bc6545
                      • Opcode Fuzzy Hash: 29344a20aca69f047023e4e60aef1606a1465d6d69c6d0cf1deaa840e1f33c6b
                      • Instruction Fuzzy Hash: EE81EE7522D301EBD311EF68E984B2AB7E5FB99701F14882DF18897291D730D924CB62
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: 07da2b1d57647947ab3c615aee7883fb7afd6dd761bc247b88d779010d8e6781
                      • Instruction ID: 2bc58e1836b2cbc8719dfee232fb4a4ad218b741d6d28e669d685eb8c4dd6ae9
                      • Opcode Fuzzy Hash: 07da2b1d57647947ab3c615aee7883fb7afd6dd761bc247b88d779010d8e6781
                      • Instruction Fuzzy Hash: FD610571915215DFD720EF18EC81A3AB3B4FF94355F48082DF98987261E331E925CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: 3be54a1b301e25e67fd90d835ae77553675a608a87b8c7bf22edc52afd4bf30f
                      • Instruction ID: e56bcb2062642855abbd442c1cc67e7121721097f5e16d5e19d2a11a777e3ee5
                      • Opcode Fuzzy Hash: 3be54a1b301e25e67fd90d835ae77553675a608a87b8c7bf22edc52afd4bf30f
                      • Instruction Fuzzy Hash: 2361F179A2A3039BD711FF55D880B2AF7EAEB84318F18891DE584872D1D771EC20CB52
                      Strings
                      • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 0024E333
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081
                      • API String ID: 0-2471034898
                      • Opcode ID: 0e07db1a55859854da32eb1fe588fda93acecb7b5eb5ffcdb4fd4bafdc51e329
                      • Instruction ID: 80c80ad77ccce1f8c4d1a397fc995e151a08e26a7f696e1b02c9a3ff106daac3
                      • Opcode Fuzzy Hash: 0e07db1a55859854da32eb1fe588fda93acecb7b5eb5ffcdb4fd4bafdc51e329
                      • Instruction Fuzzy Hash: 82516833A796904BE72D893C5C153696EC72B92334B3EC3A9E9F58B3E5D5958C104350
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: 75bddc0d89997d76790b533f8eb057da518073e5f395a6ff387653baa843863b
                      • Instruction ID: ae4cff09255503e8ff676365b6e83661f8671bcf159db54f3addd9cdd56edbae
                      • Opcode Fuzzy Hash: 75bddc0d89997d76790b533f8eb057da518073e5f395a6ff387653baa843863b
                      • Instruction Fuzzy Hash: EC51B33862A201DBDB28EF55D884A2EF7E5FF85B44F14881CE4C697291D771DE20CB62
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: w
                      • API String ID: 0-3721766003
                      • Opcode ID: 7c7b3a014180d68a994193fa926960c982cfd39a93d63c5fe39c38b9317f5070
                      • Instruction ID: e9a67d47a784d14a6569f31e4d705936afdc6038d3d8b79dbf688e9a31ec4a23
                      • Opcode Fuzzy Hash: 7c7b3a014180d68a994193fa926960c982cfd39a93d63c5fe39c38b9317f5070
                      • Instruction Fuzzy Hash: 264103F3A086184BE310BA3DDC8977AB7D4DF95710F0A463DDBC887784E938590586C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: L3
                      • API String ID: 0-2730849248
                      • Opcode ID: 6e8fa63b3e3c17b3fe6154eef17ea9c35f5cd53294a4041bc5feb01d7ea06bee
                      • Instruction ID: ccaccc9c79719b3373805b2c86d49f62b7c02c2861d191a56a07f759b2279480
                      • Opcode Fuzzy Hash: 6e8fa63b3e3c17b3fe6154eef17ea9c35f5cd53294a4041bc5feb01d7ea06bee
                      • Instruction Fuzzy Hash: 464162B40183819BC714AF24D894A2FBBF0BF86316F04890DF9C59B290D736C929CB5B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: 751117f1a4c66a37e7777044214448204863452df780f5adeb7d9c8e34d068b1
                      • Instruction ID: 51cced9edf8c336ea09b94c34e9be33aceb9a9eed673881772abe4c999555815
                      • Opcode Fuzzy Hash: 751117f1a4c66a37e7777044214448204863452df780f5adeb7d9c8e34d068b1
                      • Instruction Fuzzy Hash: 42311A7992A311ABE650FE54DCC1F2BB7E8EB45744F144829F48597292E231DC38CB63
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 72?1
                      • API String ID: 0-1649870076
                      • Opcode ID: 5f70c80aa81d8e16cdeefa2f78b03ce7bb6921cde67fe1f3bd3f22466ceed9eb
                      • Instruction ID: c93c0a110dc578ce64415e05868795ead41650243469a9c63bef4c4b98d00c19
                      • Opcode Fuzzy Hash: 5f70c80aa81d8e16cdeefa2f78b03ce7bb6921cde67fe1f3bd3f22466ceed9eb
                      • Instruction Fuzzy Hash: AC31E6B5911206CFDB21CF95E88056FF7B5FB1A704F24081DE446A7341D331A964CBA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %*+(
                      • API String ID: 0-3233224373
                      • Opcode ID: cf64e885ab6b8dbe3d2664d8ebfb4e04737d7d8ebc90411cd0588b2674c0cfae
                      • Instruction ID: d1620cd76be5b87cd5e5183b563d62770bfffdae1faa1c6ade92ccdac95d83a7
                      • Opcode Fuzzy Hash: cf64e885ab6b8dbe3d2664d8ebfb4e04737d7d8ebc90411cd0588b2674c0cfae
                      • Instruction Fuzzy Hash: 97418C75225B11DFD7358F61E994B26B7F2FB08302F14880CE98A97AA1E331F8248B14
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 72?1
                      • API String ID: 0-1649870076
                      • Opcode ID: 2543b912480dc90f63160378e6a7df2cb434704c61dcc7abd52c6da440c86cf8
                      • Instruction ID: 452dfce7f0b0f45e528831e3112efca9dc15919674dd8891370082e4aa27f122
                      • Opcode Fuzzy Hash: 2543b912480dc90f63160378e6a7df2cb434704c61dcc7abd52c6da440c86cf8
                      • Instruction Fuzzy Hash: 4F21E2B5911206CFDB21CF95E98456FFBB5BF1A700F25081DE446AB341D331AD60CBA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: @
                      • API String ID: 2994545307-2766056989
                      • Opcode ID: 8bb7bfa3c493801fd54515b726d99c847aa96ee3f37fb8a70ccc81b197a1765a
                      • Instruction ID: 836d50ff5159f441b9c4d20ddbb88bdfa347672717829a547a4445e37f7d8ef2
                      • Opcode Fuzzy Hash: 8bb7bfa3c493801fd54515b726d99c847aa96ee3f37fb8a70ccc81b197a1765a
                      • Instruction Fuzzy Hash: 4431987451A3019BD310EF14D880A2AFBF9EF9A314F18892CE1C597291D335D954CBAA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a8fa481da0c05713b4d12bb7db5aad8500b76d75ea041849f6707554c36415b
                      • Instruction ID: fe340f95f91a23fe3a42e2834c81e04dbaa727852a8355cfc56d12a047aedebe
                      • Opcode Fuzzy Hash: 2a8fa481da0c05713b4d12bb7db5aad8500b76d75ea041849f6707554c36415b
                      • Instruction Fuzzy Hash: 6E628BB0520B008FD725CF24D990B27B7F5AF59701F54896CD89B8BA92E734F868CB94
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 30cb9a533554be97e06675d3460cdff0be9d55b2c6c1132c24f0b6137cc6b4a7
                      • Instruction ID: f6427123a56c13f0390be9fd475664febfeb1a9b6eaccd73810bf2f78ab44fa3
                      • Opcode Fuzzy Hash: 30cb9a533554be97e06675d3460cdff0be9d55b2c6c1132c24f0b6137cc6b4a7
                      • Instruction Fuzzy Hash: B5520931A297128BC7699F1CD4402BAF3E1FFC4319F358A2DD9C697280D774A861CB86
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b31e72f986159e8952ae57aa0510404f43f8fc8ac0994e10dc08b28f6cdfafea
                      • Instruction ID: f30f17ea4be5ce55b0691b2e6737abd87e6245e3fd6308160de1613703774e93
                      • Opcode Fuzzy Hash: b31e72f986159e8952ae57aa0510404f43f8fc8ac0994e10dc08b28f6cdfafea
                      • Instruction Fuzzy Hash: D022E039619341CFC704EF68E890A2AB7F1FF89315F09886EE58987391D735D861CB42
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d30fd60f98ef48b4da918fbeb7d6f978ff35a103d5b9ab574088bd50e204e116
                      • Instruction ID: 395dd9d0a053b1105b278ad64b31b1bae1de11c7ed24109b3d39d506f4e7d9b9
                      • Opcode Fuzzy Hash: d30fd60f98ef48b4da918fbeb7d6f978ff35a103d5b9ab574088bd50e204e116
                      • Instruction Fuzzy Hash: 0B22CD39619340DFC704EF68E894A2AB7F1FF89305F19896EE489873A1C735D861CB42
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2247f8748038c52eae747b46319418256ce0bbdac68849bea44e64091997cddf
                      • Instruction ID: 17f28961b431abd85275096d25e2e49703da3835e9e7917c5f53eb8fbc67949e
                      • Opcode Fuzzy Hash: 2247f8748038c52eae747b46319418256ce0bbdac68849bea44e64091997cddf
                      • Instruction Fuzzy Hash: FA52B270A18B858FE73ACF34C4847A7BBE2AB95314F144C2EC5D606B82C779E895CB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 03357bd638323729c92b3fbcd9352e4fe12ba3435e645a365c1a4486520bb5be
                      • Instruction ID: 61b8e094dd344d03d5af0035e5331619d7095f459c0a24eecf62b82aa16e60c1
                      • Opcode Fuzzy Hash: 03357bd638323729c92b3fbcd9352e4fe12ba3435e645a365c1a4486520bb5be
                      • Instruction Fuzzy Hash: A352C13151C3468FCB19CF28C0806AABBE1FF88318F598A6DF8A95B351D774D959CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 580404ba1eec9d111f97f9074051206253c8fe5565396bc4de793e941236b04c
                      • Instruction ID: ca0b43ba52532daac9fca8f907d42f3d19c784f10062ab783fe638a2aa3bcecf
                      • Opcode Fuzzy Hash: 580404ba1eec9d111f97f9074051206253c8fe5565396bc4de793e941236b04c
                      • Instruction Fuzzy Hash: 5F428979619301DFDB08CF28E85476ABBE1BF88315F0A886CE4898B391D375D995CF42
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f703e7302fa76bffe4e14ed48f32244ef367160f756676189bce58fb0045c1cd
                      • Instruction ID: b2886488f7bce19bae95e7cf6f33f223feff42de1247d320612105390d519533
                      • Opcode Fuzzy Hash: f703e7302fa76bffe4e14ed48f32244ef367160f756676189bce58fb0045c1cd
                      • Instruction Fuzzy Hash: 2C320270A24B118FC368CF29C59062ABBF1BF45710B604A2ED6A78BF90D776F855CB10
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e71450f44d9ba346ff0deb44375faadca62000974c755c6d559f6ab46377d706
                      • Instruction ID: ad4b4c61058e98f1dea171f11193d6aea77d9eed87d943f8a6823df161117ac3
                      • Opcode Fuzzy Hash: e71450f44d9ba346ff0deb44375faadca62000974c755c6d559f6ab46377d706
                      • Instruction Fuzzy Hash: A902BD34619341DFC704EF68E884A2ABBE5FF89305F19896EE4C987361C735D861CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 649690b0c82675905ecc2f53ca141fc073fb4fc64c4cb0bbbea0d0b05f072a2b
                      • Instruction ID: 527f7c45609df34aaff8b10705e22920571c9b8dc36657687d9b4ffa586f43e0
                      • Opcode Fuzzy Hash: 649690b0c82675905ecc2f53ca141fc073fb4fc64c4cb0bbbea0d0b05f072a2b
                      • Instruction Fuzzy Hash: C4F1BC3461D341DFC704EF28E884A2AFBE5BF89305F18896EE4C987291D736D861CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8c18f235328356d0583164e0ca225357e5187d5e79611ec5f4f0d484103b668d
                      • Instruction ID: d449ccbda2b8c9f20e8cb1b475f216cb572df2d17815d6f6eae2bbe0ede38b43
                      • Opcode Fuzzy Hash: 8c18f235328356d0583164e0ca225357e5187d5e79611ec5f4f0d484103b668d
                      • Instruction Fuzzy Hash: 64E1DF35A19341CFC304EF28E884A2AF7E5FB89315F19896DE8C987391D735D851CB82
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8dbf8a9190905fd82ba4d34b3568b61c3c587483ba5650872ac470c2db95d517
                      • Instruction ID: fb568936767479930d332724fecbd05eb83be455f8ccddb4a0df9bf05fd0ef7a
                      • Opcode Fuzzy Hash: 8dbf8a9190905fd82ba4d34b3568b61c3c587483ba5650872ac470c2db95d517
                      • Instruction Fuzzy Hash: F2F1BB766483418FC728CF29C88176BFBE6AFD8300F08882DE4C587751E639E955CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2519140c5bbe640d739c6a2f73d9670c6118236b0f35073bf6edf326dc101262
                      • Instruction ID: 095a9db86a6626a9d01fa8c40a05331f5b510a15919bb6e42e900260694875a6
                      • Opcode Fuzzy Hash: 2519140c5bbe640d739c6a2f73d9670c6118236b0f35073bf6edf326dc101262
                      • Instruction Fuzzy Hash: CFD1CD3461D241DFD304EF28E884A2EFBE5FB8A305F58896EE4C587291C736D861CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8cf8c5f9c8eb9e4da356dbd8d55e986c225cc6e337383f1164352d6d6b8367ef
                      • Instruction ID: 9e399ff296a95685215ab2b2a7b2e1a520e3c45dfb57dc8d7b3a71a2fb810bb2
                      • Opcode Fuzzy Hash: 8cf8c5f9c8eb9e4da356dbd8d55e986c225cc6e337383f1164352d6d6b8367ef
                      • Instruction Fuzzy Hash: 76B11576A2D3504BE314EE28CC4176BB7E9EBC4314F28492DE999973C2E735DC148B92
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce1e51f0d59d21bc77ba757d64e2a04cd19807742ba23e46a52a87bd13af08c7
                      • Instruction ID: b28586503bf419c1f84b6fc4eba31d1325a9b0b4cf378ad2d28173da713262ab
                      • Opcode Fuzzy Hash: ce1e51f0d59d21bc77ba757d64e2a04cd19807742ba23e46a52a87bd13af08c7
                      • Instruction Fuzzy Hash: 01A1BDB3F112254BF3544938DC983A266929BA5324F2F427C8E9CAB7C5DDBE5C0A5384
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c6117061885288c1b39a5b943f8482e52345fd8b1a48c2f17ef7dcb0cf10c7c
                      • Instruction ID: 0bca0113d7ef94c98461d45e545b6c1ccdaf170f67a8317705d0f87f60a88ab3
                      • Opcode Fuzzy Hash: 9c6117061885288c1b39a5b943f8482e52345fd8b1a48c2f17ef7dcb0cf10c7c
                      • Instruction Fuzzy Hash: 86C19CB2A187418FC365CF28CC96BABB7E1FF85318F08492CD1D9C6242E778A155CB06
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e2b9ba186327f538b93f576fe38beff7eee9758d24e448a25eeca6f06dd6daf3
                      • Instruction ID: f92fb49ea086db9992eac72dd1e91520d126bd9737b1f4fa53e26f3a8fbbcacc
                      • Opcode Fuzzy Hash: e2b9ba186327f538b93f576fe38beff7eee9758d24e448a25eeca6f06dd6daf3
                      • Instruction Fuzzy Hash: A5B111B4510B008FD3258F24C984B27BBF5EF46705F54885CE8AA8BA52E735F819CB58
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: a340a74484dc77db97e5596f806ed0377e703eace65bc96de946fa241d8a2169
                      • Instruction ID: 8c798b61277fd6b76107b1bb7e537dab116d1eca6de1da7ae6da8509113a90a0
                      • Opcode Fuzzy Hash: a340a74484dc77db97e5596f806ed0377e703eace65bc96de946fa241d8a2169
                      • Instruction Fuzzy Hash: 5491B07962E301ABE720EF14D840B6FB7E5EB85350F64481CF89497391E730E960CB92
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 18fe6109a5db5d3165587f500a5101cf3d22b6b9f415af6ea507b411ec27e26e
                      • Instruction ID: 1a525cecd8c088e673c47316fbf010a840e8cbdd6c92c641c6b3861515bf2f19
                      • Opcode Fuzzy Hash: 18fe6109a5db5d3165587f500a5101cf3d22b6b9f415af6ea507b411ec27e26e
                      • Instruction Fuzzy Hash: 0D81A43821A7028BE724EF58D880A2EB7F5FF45750F45895DE985C7291EB35EC20CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41ff68362283b61ceae4dbdab95dd66b61dbf500e2ed6c01b715ff4064322fd8
                      • Instruction ID: a12b9e2e94d4ccf4bf42c44825f48a7f2dde47152d1354ea6c11c0857981b0f2
                      • Opcode Fuzzy Hash: 41ff68362283b61ceae4dbdab95dd66b61dbf500e2ed6c01b715ff4064322fd8
                      • Instruction Fuzzy Hash: 75710637B79E904BC3149D3C9C8A395AA434BD6334B3DC379A8B88B3E5D6794C165350
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef865825e64b04da81eac47430a13482d22c40f37ab31e38a82726d6cfa94db5
                      • Instruction ID: 205323d6e8609f03307ffb8bca88010ab6eb24e21f1c069d5776bab2b196f3c9
                      • Opcode Fuzzy Hash: ef865825e64b04da81eac47430a13482d22c40f37ab31e38a82726d6cfa94db5
                      • Instruction Fuzzy Hash: BB6188B4428351CBD311AF18E891A2ABBF4EF92750F14491DE4C59B261E339C964CB66
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87a6a9715d49cf4857ea7843915bc84f4287cef7f58870f35e4293dabd84901c
                      • Instruction ID: 4507389b83239fa26e111f77705c2698724304fbd01fb810b31058a28bce799e
                      • Opcode Fuzzy Hash: 87a6a9715d49cf4857ea7843915bc84f4287cef7f58870f35e4293dabd84901c
                      • Instruction Fuzzy Hash: 1151DFB1628205ABDB209F24EC82B7733B4EF85768F144958F9858B390F375DC95C762
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d108e008403b3c92b59985e25fae4eb0cb21936506a5ffd7efe5999b9cc5533
                      • Instruction ID: b7708011600e15cbfda7255f8b0b472e5137248f882a816809ab1c5efecca82f
                      • Opcode Fuzzy Hash: 6d108e008403b3c92b59985e25fae4eb0cb21936506a5ffd7efe5999b9cc5533
                      • Instruction Fuzzy Hash: 0161CE316293029BE714CE2DC58032EBBE6AFC5350F64C92EE49D8B355D2B0DDA6D742
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 34522cb33fd81f7d014f907b2a379fcbcc00d61180d903c31cb5e95a9153d9bd
                      • Instruction ID: 306975ed586bef314db670467e1bcf4f33898bfe0817c58eb5f9e1a461db6d9c
                      • Opcode Fuzzy Hash: 34522cb33fd81f7d014f907b2a379fcbcc00d61180d903c31cb5e95a9153d9bd
                      • Instruction Fuzzy Hash: 34614737ABA9914BC314453D6C5D3A6AA831BD2330F3EC3A699B98B3E5CDF94C114352
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a3cc88c795c5d61c8b930868832c4e7e5ad4854c9a62c994637f41bb00b05252
                      • Instruction ID: 710aa1327cad550a7190b7fa703e9e1cbb0f70f21a8aaf807ea0f9e769e86e2b
                      • Opcode Fuzzy Hash: a3cc88c795c5d61c8b930868832c4e7e5ad4854c9a62c994637f41bb00b05252
                      • Instruction Fuzzy Hash: 7681E4B4810B00AFD360EF39D947757BEF4AB06201F404A1DE8EA96694E7306469CFE3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 648836325f4959cb435abf1ac01bf808717046fde7a1f5ad19d0f025c27c754c
                      • Instruction ID: d920405091769a81474753420a21b7e9ec11ae48a2d4acca6b420880138f21e6
                      • Opcode Fuzzy Hash: 648836325f4959cb435abf1ac01bf808717046fde7a1f5ad19d0f025c27c754c
                      • Instruction Fuzzy Hash: CA5170F3A0C2045BF318A92DEC5573BB7D6EB94320F1A463CEAC9C3784E97D58058296
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: de1cf11d0052deeb7ad764dc86ca86733fa3f1d712229728af6150aca84ccd1c
                      • Instruction ID: 51c90cccb3f599fdf11e52b4627d467ac5b2e9dff5edaf0b11201615d541849b
                      • Opcode Fuzzy Hash: de1cf11d0052deeb7ad764dc86ca86733fa3f1d712229728af6150aca84ccd1c
                      • Instruction Fuzzy Hash: 345135F3D186249FE714AE28DC8576AB7D5EB58320F1A063DDEC8D3380E53A5C0586C2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53adb1b22930f8a695f789fdc3f4b943ccd6ac5fb5c634955e3c1cdf4e3fec6a
                      • Instruction ID: 7a14a9c5ed6a65cbfdada35e234e3b6b4597252120334ee399f5ad1ba43e0d79
                      • Opcode Fuzzy Hash: 53adb1b22930f8a695f789fdc3f4b943ccd6ac5fb5c634955e3c1cdf4e3fec6a
                      • Instruction Fuzzy Hash: 34517BB16083548FE714DF69D49435BBBE1BB89318F054E2DE4E983391E379DA088F92
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49522486223f5c48a6e9ac9c75f5d3b45322acfb5691dc029afc8507db50d1b4
                      • Instruction ID: f390eae9087be7d77f2ac88a37890c9b417c81663a08baf293dc4b8ca46598d7
                      • Opcode Fuzzy Hash: 49522486223f5c48a6e9ac9c75f5d3b45322acfb5691dc029afc8507db50d1b4
                      • Instruction Fuzzy Hash: 965159F251C348EFD3047E2AEC4197EBBE5EB41311F22463FD6C242390EA3A58569687
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4da16343d867cabc552119d5130ce46ad645afb3493a0fceb84d6cf965596dc9
                      • Instruction ID: bc957d19fa85083d8335c7f9de863d6b87f6c84e82a519c6636811da27ea47a5
                      • Opcode Fuzzy Hash: 4da16343d867cabc552119d5130ce46ad645afb3493a0fceb84d6cf965596dc9
                      • Instruction Fuzzy Hash: 1C51073962D2119BC715AE18DC90B2EF7E6EB85314F788A2CE8E5573D1D631EC20CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 254864a97cbd4e881cdf33aaf5a2782432af764d8888dcd5d27f00a7d3825415
                      • Instruction ID: 4cc4a000faed3dc661ad17cbcc07b36bd623668f40bc44ca0d57a2c049ed852d
                      • Opcode Fuzzy Hash: 254864a97cbd4e881cdf33aaf5a2782432af764d8888dcd5d27f00a7d3825415
                      • Instruction Fuzzy Hash: 8251D1B5A147259FC718DF18C880926B7A1FF85328F15466CF8D98B352D631EC62CB92
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 816244f9dfcf01c79cdfe81bd2a4d03fabbb4007ec71015c07fe5804a848ab03
                      • Instruction ID: bd264d96b01995eea0f693c006b124fffe6c99b7dc8f35ca5ed663047ac59be4
                      • Opcode Fuzzy Hash: 816244f9dfcf01c79cdfe81bd2a4d03fabbb4007ec71015c07fe5804a848ab03
                      • Instruction Fuzzy Hash: AC4128F3A483145BE3106E58FC85BABB7D9DF54730F1A4239DAC493780EA79590082D7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f20fe8019fccaf455a575978fb405c9d485a0eb4300c43aadf216473be34318
                      • Instruction ID: c82a1f8260cbbc2648637c6e0a6d5e7a1677a6393ea3e08971a8a8e56fe25cb9
                      • Opcode Fuzzy Hash: 8f20fe8019fccaf455a575978fb405c9d485a0eb4300c43aadf216473be34318
                      • Instruction Fuzzy Hash: C841AF78910326DBDF208F54DC91BADB7B0FF0A340F144549E945AB3A0EB38A9A1CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e73b8972cc597ad95e9c25ff6c0fa31bd7a0e529ef204b8a2d4ca06ce2e85ac1
                      • Instruction ID: 902bbf94d70b1c620d1a48644bb926d1cd1cd8b5f1bf159c9c2b1b5ce082256c
                      • Opcode Fuzzy Hash: e73b8972cc597ad95e9c25ff6c0fa31bd7a0e529ef204b8a2d4ca06ce2e85ac1
                      • Instruction Fuzzy Hash: 0E41A43821A301ABD710EF54D990B3EF7E5EB89714F18882DF58657291D336E860CB56
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe6be84cebd60c4481d2d874b0a69f57b68a7eea93afe1b0c73955aca77ed6da
                      • Instruction ID: e97cd9baf89add265e36e3c59ff555641e7ef2432b4ed4cb68b89780201d4ec3
                      • Opcode Fuzzy Hash: fe6be84cebd60c4481d2d874b0a69f57b68a7eea93afe1b0c73955aca77ed6da
                      • Instruction Fuzzy Hash: 1B410832A1C3654FD35CCE29849063ABBE2AFC5300F19C62EE8D6873D1DBB48959D785
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e37e24197a7608e4da7eed52bdab63bf5c458d83501e625393f5bd0d30bc9f73
                      • Instruction ID: fd3e7e5e222a44fcbe6d385d98e84decbaa07790ce25ff33045c952894b1a00c
                      • Opcode Fuzzy Hash: e37e24197a7608e4da7eed52bdab63bf5c458d83501e625393f5bd0d30bc9f73
                      • Instruction Fuzzy Hash: D84102745183809BC321AF54D888B1EFBF5FB86346F14491DFAC497292C376D8288F6A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f479f1542f517cf2f1e44d2dcac15776d5c6abfb8bb9a882f49bc8cf5f6886d7
                      • Instruction ID: e44150db3d0de01e7a2bdfc4b3fdb91095f6c559fff973a0bb6467e28e295cd2
                      • Opcode Fuzzy Hash: f479f1542f517cf2f1e44d2dcac15776d5c6abfb8bb9a882f49bc8cf5f6886d7
                      • Instruction Fuzzy Hash: DE41D23561D2518FC304EF68C49052EFBE6EF99300F498A1ED4D5D7292DB74ED118B82
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db79ef8acfa3e727922c49bdc082ae5ef83d60569efbb42fe8d408eeed1e81b9
                      • Instruction ID: 46fdee85c3a2333b5055000bade7408e14bd12cfd114f482b7ce23ed240feaa3
                      • Opcode Fuzzy Hash: db79ef8acfa3e727922c49bdc082ae5ef83d60569efbb42fe8d408eeed1e81b9
                      • Instruction Fuzzy Hash: 2C41C7F3E082108FF354AE28DC457AAB7E5EF94310F0B493DDBC8D3680D57958018696
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7bb3a74663f91662184ea0dd632df914f5fc898b1b4290405756ae03bcddb7f3
                      • Instruction ID: 91cf73c3cb5849f061e0769d2336639ae0ae9b900108c3c99939321e82accf5b
                      • Opcode Fuzzy Hash: 7bb3a74663f91662184ea0dd632df914f5fc898b1b4290405756ae03bcddb7f3
                      • Instruction Fuzzy Hash: 4D41CCB56193828FE3349F14C885BAFB7B0FF96361F040959E88A8B791E7744850CB97
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5be6113664422e96713363ec41851647c31506b086c17a8b3ff98e201e465e1
                      • Instruction ID: 666bc8f765c4122cac4715fa3430645c5c986df79a90ebe9533c0a02af39f2e1
                      • Opcode Fuzzy Hash: c5be6113664422e96713363ec41851647c31506b086c17a8b3ff98e201e465e1
                      • Instruction Fuzzy Hash: C521F53291C2258BC3249F59C58163AF7E8EB99704F46C62ED9C8A7295E3359C2487E2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 400d7180134a073e125dea4a147958cb75a5cbbd8ef099f4a0a9f026780aa5d9
                      • Instruction ID: 8d9786e31441fa3bfec832e1445caa5919142df13f10e95cb2aab1730962b5a2
                      • Opcode Fuzzy Hash: 400d7180134a073e125dea4a147958cb75a5cbbd8ef099f4a0a9f026780aa5d9
                      • Instruction Fuzzy Hash: A131557442D3829AE704DF04C49462FBBF0EF96384F54580DF4C8AB2A1D338D999CB9A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d018616cd6f02c1a7810b12592332ff37281e186c2c4eae162b11bc50b487f2
                      • Instruction ID: 58a5f4a9dc2bc42547ae08252ee2806b646bc1318694e09ebc49b4d071284e02
                      • Opcode Fuzzy Hash: 6d018616cd6f02c1a7810b12592332ff37281e186c2c4eae162b11bc50b487f2
                      • Instruction Fuzzy Hash: 2D21B271529221DBD710AF18C85192BB7F4EF92764F54890CF4D59B292E335C9A0CBA3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cbe2eee255ce80e2df90ed4850d7395439c2c852be5922ee4a7cea5853ec6c97
                      • Instruction ID: 58b5fa223a8d5eed87d9f703c17db6933eb73457ed14d7d7f6a0816a90d0beed
                      • Opcode Fuzzy Hash: cbe2eee255ce80e2df90ed4850d7395439c2c852be5922ee4a7cea5853ec6c97
                      • Instruction Fuzzy Hash: 8631FE316682119BD718AE18D89072BB7E1FFC8359F18852CE89ACB341D331EC62DF46
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba866a8e7c0f1faba80d8369b0bbb62dbb18f2accc2cfac149f0dc26299f6ce5
                      • Instruction ID: ad0ef38400d710aae76172e1c4a6b1a281b08175f5f0c055991feb0e36f2e879
                      • Opcode Fuzzy Hash: ba866a8e7c0f1faba80d8369b0bbb62dbb18f2accc2cfac149f0dc26299f6ce5
                      • Instruction Fuzzy Hash: 4C21697862D201DBD715EF59E488A2EF7E5EB85741F28881CE4C4933A2C335A860CB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e3779009fbb5303096bd6a0898f8c7e8f90d6278a2d98f3cba04b4901684bd96
                      • Instruction ID: fd24b9637ca8f52c1e0e925a1545cfb30631027ff29a7d430908b021f36cf4b3
                      • Opcode Fuzzy Hash: e3779009fbb5303096bd6a0898f8c7e8f90d6278a2d98f3cba04b4901684bd96
                      • Instruction Fuzzy Hash: A72148B491021A8FDB14CFA4CC90BBEBBB1FF4A301F144808E811BB282C735A915CF68
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                      • Instruction ID: 13ad75078fb74d3fc7966958794cc3eb6ba75e8a87ca2e1f4b52e25452819d74
                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                      • Instruction Fuzzy Hash: 7611E533A251D90EC7178D3D8440665BFA71AA3234F59C399F4BC9B2D2D7328D8A8364
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 90022ddfb32469098a8610d4b68e70bc315f5b0e8987f5b71d64abe4c0da561b
                      • Instruction ID: d2447624f5e35256b5e8ae7d4ddd5c32cf5824f563690ad29162c58d4f9e897a
                      • Opcode Fuzzy Hash: 90022ddfb32469098a8610d4b68e70bc315f5b0e8987f5b71d64abe4c0da561b
                      • Instruction Fuzzy Hash: C10175F5A2130287E7209E5494D1B3BB2A86F4171CF18952CD40E97241DB76ED29C695
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cebbfc0f584d1be58e88791ac9d2e35407e8704d97e1cd3bb87266d00d70ee89
                      • Instruction ID: 2e466d7a6a2322df48151d526a02d52e3b7f0fda1ffe90af554a52e85bbf34d9
                      • Opcode Fuzzy Hash: cebbfc0f584d1be58e88791ac9d2e35407e8704d97e1cd3bb87266d00d70ee89
                      • Instruction Fuzzy Hash: 4E11EFB0418380AFD310AF618494A1FFBE5EB96714F248C0DF5A49B251C375D859CF56
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e9705825b1d8e109d1a00a1b80eda3633d65f4d6a2961faa1e953192412362d9
                      • Instruction ID: 9fa11c9a84cb3ef0e674cdf838772171c292fe4f88836c0079eb8d7cafe71236
                      • Opcode Fuzzy Hash: e9705825b1d8e109d1a00a1b80eda3633d65f4d6a2961faa1e953192412362d9
                      • Instruction Fuzzy Hash: 82F0593E72920A0FA215CDAAF88883BF3D6D7DA354B05153DEE81C3611CD72E80682D1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dad40b8a8b0cf0c680be38028a9801f4e1e9da1297b4f3b9e1d9df466e9bee7e
                      • Instruction ID: 6506d07c58c905065930edc77b6421f51c28c54387ea28b09faa2761b04cb969
                      • Opcode Fuzzy Hash: dad40b8a8b0cf0c680be38028a9801f4e1e9da1297b4f3b9e1d9df466e9bee7e
                      • Instruction Fuzzy Hash: 1E0162B3A199610B8348CE3DDC1156BBAD15BD5770F19872DBEF5CB3E0D230C8118695
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d8ebd7708255391ffa87ed53dd5dbf97c7cff7b52fcdad9dabb06971c835301f
                      • Instruction ID: afd6f86e1ed7dc578beff9a6215ab27dc393fb41cabbec3b70aacfa27007612f
                      • Opcode Fuzzy Hash: d8ebd7708255391ffa87ed53dd5dbf97c7cff7b52fcdad9dabb06971c835301f
                      • Instruction Fuzzy Hash: EB014B72A196204B8308CE3C9C1112ABEE19B86330F158B2EBCFAD73E0D664CD548696
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 809ee23363f840c811a801533be2b64f834fb93f4c5a4ab9cc37b5a2fd812bb4
                      • Instruction ID: 571778a3a5f56cc0c90cf0f1b56744c6e85295d216e00405ff2b3bdcdf00f629
                      • Opcode Fuzzy Hash: 809ee23363f840c811a801533be2b64f834fb93f4c5a4ab9cc37b5a2fd812bb4
                      • Instruction Fuzzy Hash: 7BF0A7B162451057DF338A549C90B37BB9CCB97355F190426EC4557183D2715C5DC3E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6f21171648d546c438ffd9a9abfdea042495395b2529c56c4ebc6e58d75606dc
                      • Instruction ID: 49394107139134d5b348673c4acbea34dfc6652c8c781afa45c97611bd86a332
                      • Opcode Fuzzy Hash: 6f21171648d546c438ffd9a9abfdea042495395b2529c56c4ebc6e58d75606dc
                      • Instruction Fuzzy Hash: 8501E4B44107009FC360EF29C445B47BBE8EB08714F104A1DE8AECB680D770A5588B82
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                      • Instruction ID: 409e244ff55ee78141bfe3b77f5db34c3080ff823d661259ae451d5aa4e4fdc7
                      • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                      • Instruction Fuzzy Hash: 22D0973560832286AF348E19A4008B7F3F4EAC3B01F48801EF582E31C8D330DC12C3A8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: af95b1d3dc82ddec7b99940670a5c2f1e0eae47f5987d04555e90120cb4f072f
                      • Instruction ID: c0b03742911814e24928aebfcef48b38ceda5f64fb0d782e2fc122b13af1da14
                      • Opcode Fuzzy Hash: af95b1d3dc82ddec7b99940670a5c2f1e0eae47f5987d04555e90120cb4f072f
                      • Instruction Fuzzy Hash: AAC01238A2A0008B82849F00B999932B3B8A306309700B02BDA02E3221DA60D426CA09
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0aeef08fabc61a990092a6aba5e7daf1be6cc7a7cc6b4f547327d3eed6f6db81
                      • Instruction ID: 70a463cb923ba5908c064b5a18ee3f588f152bdb08c1d0860c1164ca7fe65560
                      • Opcode Fuzzy Hash: 0aeef08fabc61a990092a6aba5e7daf1be6cc7a7cc6b4f547327d3eed6f6db81
                      • Instruction Fuzzy Hash: B8C04C3866D000869108CE04E969475E2669AA7628624B01AC80A23695C124D512951C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e3ad4e03eeeb94fe97e0ae75e7a327826681bbe39e767397a06907151368b97c
                      • Instruction ID: f3917e73227a962dd4f6cfd36e62504c81e2de8eb1ec6afebfb8238c16fad98d
                      • Opcode Fuzzy Hash: e3ad4e03eeeb94fe97e0ae75e7a327826681bbe39e767397a06907151368b97c
                      • Instruction Fuzzy Hash: 99C04C39A6A0408A82848E85B995532A3A85316209714703B9B02E7261D560D4258609
                      Memory Dump Source
                      • Source File: 00000000.00000002.2072149939.0000000000241000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                      • Associated: 00000000.00000002.2072124446.0000000000240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.00000000002A0000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000428000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000050E000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072210110.0000000000557000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072488733.0000000000558000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2072607974.00000000006FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_240000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6301bcafc9b1383428af69c17d1a97369e60e2061873d6c4c37c61107396239
                      • Instruction ID: b088e64db61e386926a8cb81503c1b064fc9bb6951d5877d9084b939be0916fa
                      • Opcode Fuzzy Hash: e6301bcafc9b1383428af69c17d1a97369e60e2061873d6c4c37c61107396239
                      • Instruction Fuzzy Hash: 43C09B2476800047924CCF14ED69535F2B69B9752C714B01EC80963255D134D511850C